Types Of Security Events And Baseline Anomalies That Might Indicate Suspicious Activity

Superior Essays
Identify strategies to control and monitor each event to mitigate risk and minimize exposure

Identify at least two types of security events and baseline anomalies that might indicate suspicious activity.

One type of a security event that might indicate supicious activity is an authentication failures found in audit logs. Audit logs contain a high volume of events so particular attention on which events that should be specifically tracked and managed require consideration. An audit log can identify patterns of activity that can signal a security a potential breach. Whether the attack was successfull or not the audit information should be stored in a central respository for future forensic refernce if ever needed.

Another type of security event or baseline anomalie could be the increased network traffic which could indicate an unauthorized server, software, or potential malware. Shareware installed on a client device is a perfect example where network traffic could increase when downloading electric content onto a corporate network that could potentially be infected with malware. Shareware also opens up the device to sharing its data to the outside world potentially leaking propriatry and confidential data. Monitoring network bandwidth, closing firewall ports, and removing local administrator rights are a few ways to remediate shareware activity.

Given a list of policy violations and security breaches, select three breaches, and consider the best options for controlling

Related Documents

  • Improved Essays

    Nt1330 Unit 2

    • 369 Words
    • 2 Pages

    The business requirements of the access control must be established and documented. Access control rules and rights for each user or group of users should be clearly stated in a policy statement about access All employees, contractors and third party users of information systems and services should be required to record and report any allegations or findings of security weaknesses in the system or the services. This aims to ensure that information security events and weaknesses detection of information security can be dealt with in a timely and…

    • 369 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    VPN A virtual private network is used by organisations to help secure data on a network. It’s very hard to access these private networks meaning that the data becomes much more secure and it can be used across a large area of a network, including many computers. This isn’t an expensive thing to do anyone can do it by using simple publicly available infrastructures. VPN also makes use of encryption firewalls and authentications services when sending data across the web.…

    • 767 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    The vulnerabilities identified in part 1 assignment was mitigated by recommending the right solutions. In part2, the network security analyst identified and proposed solutions for the right network devices to protect the accounting firm's network from intruders and external cyber threats. In this final assignment section, the network security analyst of the accounting firm will propose the application/end-user security recommendation to protect the company’s sensitive information. The analyst will also ensure that the proper procedure and policies are in place to take care of network security and employees should be trained and aware of those policies from possible threats including cyber-attacks.…

    • 730 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Ba501 Week 1 Assignment

    • 740 Words
    • 3 Pages

    II Abstract Security is a need that is increasing at a rapid rate especially with a large organization and constant changes seem to be the norm.…

    • 740 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Nt2580 Unit 7

    • 395 Words
    • 2 Pages

    Written Assignment – Unit 7- Ecommerce ________________________________________ Submit a written paper which is at least two pages in length, double spaced in Times New Roman (or its equivalent) font which is no greater than 12 points in size. After referring to Chapter 3 of Information Security for Non-Technical Managers, discuss the three main areas of accountability regarding information security. When discussing each area, provide an example from outside the textbook. Information security is about all that an organization can involve in, it comprises the data stored by the security center whether in an electronic machine or in a vast area room.…

    • 395 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    A known malware is downloaded EVERY 36 MINUTES Sensitive data are sent outside the organization Unknown Malware Every hour 106 unknown malware…

    • 428 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    Tammie, You did an excellent job answering this week’s discussion board question. Suspicious exceptions is an excellent way to identify activity which could potentially be attempts of system compromisation. One thing to be careful of when automating policy enforcement through suspicious exception is to ensure to minimizes or eliminate false positive and false negative alerts. Failure to have correctly functioning security detections or having false security detections causes a huge security risk.…

    • 188 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    The following case study is based on a company called Target, which experienced a security breach in 2013 (Aguilar, 2014). Hackers penetrated the Target’s system through their web server (Aguilar, 2014). The hack exposed 40 million credit card and debit card details such as CCV numbers, credit card numbers, etc. as a result, employees lost their jobs, and board members were threatened with retrenchment (Aguilar, 2014). After that 140 lawsuits followed (Aguilar, 2014).…

    • 377 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Regardless of the size of your company, its products or your location, security threats are always worth considering. In today 's digital environment of video cameras and 24/7 monitoring, decision-makers often concentrate on cyber security issues exclusively, which leaves businesses vulnerable to high-impact physical threats. Many entrepreneurs and business stakeholders forget that their businesses are vulnerable to accidental incursions, smash-and-grabs, terrorist attacks and other…

    • 950 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Dage Michael Martinez Fraud Auditing May 1, 2016 Fraud Audit Program: Hollate Assess: Fraud: Type/Scheme Control Opportunity Occurs/Fraud Scenario Concealment Red Flags Conversion Journal Entry Scheme The scheme likely occurred due to management override of controls.…

    • 1732 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    Zunis Investments

    • 1339 Words
    • 6 Pages

    For the purposes of this project, the international investment company in question is Zunis Investments. Zunis is an international investment company headquartered in New York, USA with operations in the North American, European and Asian continent, specifically in countries such as Mexico, USA, UK, Finland, Sweden, France, Japan, China and India. They are doing an IT security upgrade and as part of the interview process for this work, they have asked for a scenario in which the company may be attacked, how to identify the attack and figure out the source as well as how to defend against that attack successfully. First off, before we get to that scenario let us start by stating an accepted definition of what an attack, threat, risk and vulnerability…

    • 1339 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Did you know that the average cost of a typical data breach is $5.4 million in the United States? A data breach can take a toll on a company of any size and consumers alike, which is why it is so important for both consumers and companies to take necessary precautions to reduce the risk of breaches. Data security breaches have a compound impact on both consumers and businesses. Once data breaches have been detected consumers must find a way to protect their personal information, and businesses have to find a way to recover along with implementing preventative measures and regaining consumer’s trust. Consumers shop with companies under the faith that their personal information will be protected.…

    • 855 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    In this section of the project, we will discuss how to mitigate, avoid, accept, or transfer the previously discussed risks. In the Risk Assessment Plan, we listed all the various risks that could interfere with operations at DLIS. The table below (Table 1.2) explains in further detail the type of mitigation we have chosen, as well as the particular strategy we will use to handle each risk.  Table 1.2 – Risk Mitigation Strategies Risk Factor Mitigation Type Mitigation Strategy Building fire Mitigation Install proper fire containment systems in all site buildings; fire extinguishers near staff Server failure Mitigation Network administrators monitor hardware at regular intervals for deviation from baseline; spare parts are kept in secure storage…

    • 681 Words
    • 3 Pages
    Great Essays
  • Superior Essays

    Cyber Attack Case Study

    • 956 Words
    • 4 Pages

    There are times when hacking still occurs. What is learned from the hacking, how the situation is handled, and new…

    • 956 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    Coroner's Toolkit is a group of basically free tools designed by Wietse Venema and Dan Farmer to be used in the forensic analysis of a UNIX machine. There are several reasons as to why local law enforcement agencies. First, the Coroner's Toolkit is specifically designed to be used in cyber-crime investigation (Farmer & Venema, 2005). This is an exceptionally powerful suite and therefore proper training of UNIX is a major condition in order to manage the Toolkit. Another important reason for purchasing this toolkit is that it helps in reconstructing the activities of an intruder by inspecting the documented times of file accesses and recuperating erased documents.…

    • 513 Words
    • 3 Pages
    Improved Essays