Summary: Incident Response

Great Essays
Running head: incident response report 1 incident response report 17

Incident Response Report Rafiu Atanda University of Maryland University College Advanced Cyber Exploitation & Mitigation Methodologies CST 630 Prof., SMITH CURTIS 8th May. 2018.

Wireless and BYOD Security Plan
BYOD/Wireless is a strategy that allows employees and organizations to utilize personally purchased /organization issued devices to perform
…show more content…
One of the methods is by cross-referencing the Service Set Identifies (SSID?s) against an approved list of access point authorized by the security team. Any Ad Hoc access points within the vicinity of Millennium Bank Inc. are rogue access point by default because they are not managed by the organization security team.
All Millennium Bank Inc. authorized access point have Media Access Control (MAC) addresses that are broadcasted within the vicinity, and recognized by the organization Address Resolution Protocol (ARP) tables. The implementation of management controls to identify rogue access points includes policies and the use of strong encryption for WPA2 secure
…show more content…
A leash is any information that is added to a packet designed to restrict the packet?s maximum allowed transmission distance. (Y.C Hug, 2003). There are two types of leashes type: geographical leashes and temporal leashes. In geographical leash, the recipient is within the distance of the sender while temporal leash ensures the packet has an upper bound to restrict the maximum travel distance.
Additionally, in an eavesdropping attack. The goal is to interfere with the signal between two nodes communicating, so the protection against it is to change the signal in some way by implementation of Frequency Hopping Spread Spectrum (FHSS) technology. The risk of signal interference is minimized by FHSS because random multi-frequency patterns are transmitted.
Self-Configuring Dynamic Networks: This is the process of automating configuration management tasks rather than using skilled administrators. It increases efficiency, productivity, reduces costs and error. The organization policies will dictate how self-configuring dynamic network will be created. There are some threats and vulnerabilities against the self-configuring dynamic network. These include inconsistent in configuration states due to dynamic configuration policies that can lead to operational failure. However, the protection will include enforcing a consistent configuration. Another threat is the change propagation problem. The protection will entail enforcing

Related Documents

  • Improved Essays

    BankID [11] allows users to log in into different merchants by using the same password and two-factor authentication. With this, it helps people to save their bank account. This is used in a web site (merchant) when it needs to securely identify its users. Overall the user need to enter their SSN (Social security number), a password, and at the end a one-time password.…

    • 640 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Nt1330 Unit 1 Assignment 1

    • 1566 Words
    • 7 Pages

    C. Services & Applications 1. TRUSTED a) Microsoft Active Directory (AD) Domain: In order to resolve the issues inherent in a peer-to-peer network, a centralized means of user authentication and resource sharing must be implemented. Microsoft Active Directory (AD) is a centrally administered, hierarchical structure designed to manage user access to shared network resources in a domain. Windows Server 2012 R2 Datacenter edition operating system (OS) is required to establish and manage the company’s AD domain.…

    • 1566 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    Nt1310 Unit 5 Lab Report

    • 362 Words
    • 2 Pages

    To perform the Radio access network using two methods: a) Using Wireless Insite (commonly known as built in post processing). b) Using MATLAB (commonly known as the post-processing). c) Cell association and cell dominance formation using wireless Insite to get UE to be associated(served) with single femtocell eNB(preferred to be robust signal) and viewing it (UE). Fig2. Cell association for the UEs 4.…

    • 362 Words
    • 2 Pages
    Improved Essays
  • Superior Essays

    Introduction The current information technology (IT) infrastructure consists of a mix of 2008 and 2008 R2 servers, with two legacy Windows 2000 servers, and four Windows Server 2012. In addition to the Windows server environment, the network consists of routers, switches, and security appliances, such as firewalls. The environment also consists of important services to ensure the security, and stability of the network.…

    • 922 Words
    • 4 Pages
    Superior Essays
  • Decent Essays

    Due to the fact that all of your communication systems will be unified under this secure network, you will be able to enjoy maintenance and operations savings on a monthly basis. BroadConnect’s phone systems provide portable connectivity through a private…

    • 480 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    3.2 Simulator Various methods available to measure the performance of data communication protocols involving live network tests, hardware emulation, test-beds and mathematical models. Software simulation, since, is usually a time effective and cost efficient method. Researchers around the globe are utilizing software simulation tools because it offers a controlled atmosphere within which any network model performance can be measured easily and efficiently. Nowadays, the popularity of the available network simulators and specifically that of Ad Hoc networks varies from one simulator to another.…

    • 1180 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Attackers exploiting default configurations to gain access to the network and to information stored on devices in the network are major threat to home gateway devices. In order to mitigate this threat there are many common default configurations a user should change. When setting up a home network, a user should make sure to change the default passwords. They should set up a strong account password and wifi password using best practices. The user should use a strong security protocol such as WPA2 instead of the default WEP which is not secure.…

    • 693 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 1

    • 768 Words
    • 4 Pages

    1. Policies: Policies like Acceptable Use, Internet Access, and Email and Communications Policies can take the risk out of the user’s hands of doing what is right. Sites that could hold malicious codes and viruses can simply be blocked from access so that it isn’t even in their “hands” to make the decision. 2. Provision Servers: Using software like IPAM, making sure that your servers all have static addresses assigned to them.…

    • 768 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Certification Authority(CA):A certification Authority which is having private and public key pairs and trusted by sensors. The role of the CA in this process is to guarantee that the individual granted the unique certificate is in the fact who he or she claims to be. External Agent(EA):External Agent is an entity who tries communicate with the WSN.External agent agent also has a private and public key pair and the public key must be certified the CA.…

    • 637 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    For this section of the report I will explain the management tools and technologies used for communicating through network to network, I will also give example on how these tools are used especially in business. Operating systems are simple software which will enable the user to be able to access function to the computer itself, the process is an input and output process where the user will input a function, e.g. through keyboard, and the output will be shown through the monitor. There are many different types of operating systems and depending on your hardware (computer), you can have a different operating systems, in different electronic devices, from computers to mobile phones and tablets. Here are the most common computer operating system:…

    • 2216 Words
    • 9 Pages
    Improved Essays
  • Decent Essays

    Frequency-hopping is used in wifi, meaning that without it, we wouldn't have laptops or any of our wireless phones. Imagine talking with your friends for hours on the phone, sitting at the kitchen table, having your siblings eavesdropping on you the whole time. Imagine walking down the street and not being able to take a phone right out of your pocket and being able to call your parents to come and pick you up, instead you would have to find a phone, most likely wait in line to use it, and pay for one phone call. We wouldn't have a lot of the privileges we have today without Hedy Lamar's idea of frequency-hopping. Global Positioning Systems, also known as GPS's, also use frequency-hopping.…

    • 531 Words
    • 3 Pages
    Decent Essays
  • Decent Essays

    Justify responses to a particular incident or emergency in a health or social care setting. (D2) Scenario 1: a student you do 1:1 work with is very withdrawn. She looks like she hasn’t had a bath for days, has dark bags under her eyes and bruise marks on her wrists. When abuse is suspected it is important that the individual’s health and well-being is seen as the priority. This is why the local child protection officer should be notified so that they can investigate the situation to prevent the child from harming themselves or the abuser from harming them.…

    • 655 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    Although police respond to emergencies far less frequently than to routine incidents,32 emergency response is a vital aspect of what police agencies do. Emergency responses, often referred to as critical incidents, are used for crimes in progress, traffic accidents with serious injuries, natural disasters, incidents of terrorism, officer requests for assistance, and other situations in which human life may be in jeopardy. Emergency responses take priority over all other police work, and until an emergency situation is secured and some order restored, the officers involved will not turn to other tasks. An important part of police training involves emergency response techniques, including first aid, hostage rescue, and the physical capture of…

    • 112 Words
    • 1 Pages
    Improved Essays
  • Improved Essays

    On November 5, 2015, I had the opportunity to meet Peg Sale, a volunteer victims advocate from the Arapahoe County Victims Assistance Program and a member of my community. The Arapahoe County Sheriffs Department provides primary law enforcement and victims assistance services for the towns located along the I-70 corridor in unincorporated Arapahoe County as well as the cities of Cherry Hills Village, Cherry Creek State Park and the Bow Mar/ Columbine Valley. Arapahoe County Sheriffs Department is also contracted with the city of Centennial to provide primary law enforcement and victims assistance and provides back up and agency assists for other agencies within the county and neighboring jurisdictions. The Arapahoe County Sheriffs Departments…

    • 816 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Core Credit Union Case

    • 1381 Words
    • 6 Pages

    Discussion Points 1. To what extent are CORE Credit Union’s networks as converged? Identify and briefly describe additional network convergence opportunities. A1. The Core Credit Union initially used traditional methods of financial transactions.…

    • 1381 Words
    • 6 Pages
    Improved Essays