Port Scanning Policy

Improved Essays
2. Policies Associated with vulnerability assessment and Penetration testing:
Organizations should enforce policies that must be strictly adhered by all associated people to make penetration tests successful and maximize the vulnerability detection rate and fix the detected risks.
a. Port Scanning Policy:
1. Purpose and Scope: The purpose of this port scan is to get the information about the devices connected in the network and get verified from the security officer so that none of the irrelevant ports are open and to make companies devices more secure. This policy is applicable to the security officer having control over devices connected in the network.
2. Policy: This policy covers the guidelines for scanning the companies’ infor-mation
…show more content…
The scanning process requires prior approval by the owner or administrator of the system.
 Approved LAN and Desktop Support and Network Services staff may conduct a port map to resolve a service problem, as a part of normal system operations and maintenance, or to enhance the security of systems.
 The Companies Security Officers performs a port map or scan to monitor compliance with this policy to perform security assessments, or to investi-gate security incidents.
 Approved companies support staff shall perform an unauthorized port scan on a system in cases where directed by authority persons.
3. Enforcement: Violation of this policy or scanning the companies’ system without prior permission of the security officers could result in loss or limita-tions on use of information resources, as well as disciplinary and/or legal ac-tion, including termination of employment or referral for criminal prosecu-tion.

b. Vulnerability Assessment Policy:
1. Purpose: To permit authorized resources (from selected third party) to per-form vulnerability
…show more content…
Roles and Responsibilities: Chief security Officer: Developing test proce-dures, performing periodic testing, documenting results and communicating vulnerabilities to the respective team leads, suggesting potential mitigation strategies.
5. Enforcement: Violation of the policy could result in loss or limitations on use of information resources, as well as disciplinary and/or legal action, includ-ing termination of employment or referral for criminal prosecution.

c. Password Policy: Upon exploiting the vulnerability of the target system the pen tester can extract the passwords and crack them to login to other systems. Hav-ing a strict password policy will help reduce this vulnerability.
1. Scope: This policy is designed to protect the organizational resources on the network by requiring strong passwords. This policy applies to all personnel who have any form of computer account on the organizational network. 2. Policy:
 Organization should have password checker so that the employees know the strength of the password. There should be application to check that the old and new passwords are not similar. The feature of “remember password” should not be enabled.
 Notification to change the password after 90 days should be

Related Documents

  • Decent Essays

    Implementing Firewall Filter Implementing firewall filters on a network makes the network free from attackers and very secured. Some of the boundaries that I will consider using on my firewall will be blocking ports on the network. First of all I will establish a new FTP session which the will initiate a connection to an FTP server that listens on TCP port 21 by default. This will help users on the network to login with user name and password before any data to port 21 will accepted. I will establish SSH(secure shell) which will provide a strong and secure communications over the network.…

    • 441 Words
    • 2 Pages
    Decent Essays
  • Great Essays

    Nt1330 Unit 1 Assignment 1

    • 1566 Words
    • 7 Pages

    To prevent unauthorized devices, and company devices that do not meet the requirements specified in the Network Health…

    • 1566 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    Nt1330 Unit 2

    • 369 Words
    • 2 Pages

    The business requirements of the access control must be established and documented. Access control rules and rights for each user or group of users should be clearly stated in a policy statement about access All employees, contractors and third party users of information systems and services should be required to record and report any allegations or findings of security weaknesses in the system or the services. This aims to ensure that information security events and weaknesses detection of information security can be dealt with in a timely and…

    • 369 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    The vulnerabilities identified in part 1 assignment was mitigated by recommending the right solutions. In part2, the network security analyst identified and proposed solutions for the right network devices to protect the accounting firm's network from intruders and external cyber threats. In this final assignment section, the network security analyst of the accounting firm will propose the application/end-user security recommendation to protect the company’s sensitive information. The analyst will also ensure that the proper procedure and policies are in place to take care of network security and employees should be trained and aware of those policies from possible threats including cyber-attacks.…

    • 730 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Penetration tests assesses the overall security. It is the process of attempting to gain access to resources without knowledge of specific user names, their passwords, or other normal means of access (similar to what an attacker would do). The big different between a penetration tester and an attacker basically is permission. A penetration tester will already have some permissions (such as an normal user account) in place from the owner or managers of the computing resources that are to be tested. From here, the pen tester will attempt to gain additional accesses.…

    • 460 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Task 2 (P2) Describe the following physical security measures and explain how they may be used to help keep systems secure. • Locks Locks are physical security measure that can be used in different aspect within the company. The locks can be put on the door to avoid people who not supposed be in the building or employees who not supposed be on that room. There are different types of locks that can be used within the company such as Password locks that be put on the doors, this will avoid anyone coming to room without password identification to enter the room. Also the company can use ID IDENIFACTION on the door so any employees comes have to use their ID in order to enter the building, this will…

    • 806 Words
    • 4 Pages
    Decent Essays
  • Decent Essays

    Nt2580 Unit 7

    • 395 Words
    • 2 Pages

    There is panel control where a unit/equip is available in front of their cameras and other apparels to diagnose and give disposable information about the concern. Most often, this kind of security is to ensure that sensitive areas can only be accessed by authorized persons only, they control the equipment, data, electronic information of the organization from breaching or any other violence. D.B Parker proposed three additional elements for Information Security: Firstly, we have authenticity which accounts on the veracity of the information stored by the control or the website manager. It ensure that the members registered in the organization are who they state to be. We have possession and control, this is the control of the documents and all information saved in a computer or on a chip with encrypted code or information.…

    • 395 Words
    • 2 Pages
    Decent Essays
  • Great Essays

    3.1 Non-Discrimination You shall not discriminate anyone in the organization based on race, religion, color, gender, ethnicity, sexual orientation or disability. 3.2 Non-Disclosure/Confidentiality You will, at all times, observe secrecy and confidentiality in respect of any technical, trade or business data or any other information that might come to your knowledge or possession, which according to the company, are necessarily confidential and form valuable property of the company and not made available to the trade and furthermore, you will not disclose them with authority of the company to anyone other than the company`s officers authorized to receive them and even after you have ceased to be in the service of the company, you shall not disclose them to anyone.…

    • 1257 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    The police department had a policy in place stating that the department reserved the right to monitor all email and internet use on its network and informed…

    • 418 Words
    • 2 Pages
    Improved Essays
  • Superior Essays

    Footlocker Code Of Ethics

    • 970 Words
    • 4 Pages

    The company that I have decided to discuss is footlocker. Footlocker is an established company known for their wide variety of trainers. The company was introduced in 1974 and it was founded in 1988 as a separate business, known as the Woolworth Company. The company is a global business owned by Ken C.Hicks. Footlocker is a public limited company so the business information and trading is free to others.…

    • 970 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    Skyview Selection Process

    • 1292 Words
    • 6 Pages

    Recruitment and Selection Policy Purpose: Skyview Inc. would attract and retain staffs that are high performing so that the organization can achieve their strategic goals, while the staffs remain aligned to the company values and ethos. The company can achieve the alignment of the company and its staff by the utilization of principles that would be outlined in the Recruitment and Selection Policy. The policy would simultaneously make sure the company meets all the legislative and regulatory obligations, in the provision of properly managed operations, a culture of superiority and a workforce mix and profile suitable to its business needs and manageability. Scope:…

    • 1292 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    The mission statement of the Tennessee Department of Safety and Homeland Security, which is the statement, which is used as a way of communicating the purpose of the organization is as follows: Mission Statement To serve, secure, and protect the people of Tennessee ("Tennessee Department of Safety and Homeland Security Mission Statement," 2014). The Tennessee Department of Safety and Homeland Security currently doesn’t have an official goals or value statement. Employees of the State of Tennessee are expected to act in a manner that will enhance the name, service and general impression of the State in the eyes of the general public. This Code of Conduct provides general rules of conduct based on fundamental ethical principles.…

    • 945 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    The 14th Amendment Essay

    • 932 Words
    • 4 Pages

    The surveillance should also be restricted to the workplace and limits such surveillance outside the working environment. The employers are not allowed to disclose or intercept wire, electronic, oral or telephone conversations without the consent of the employees unless they are legitimately for business purposes. The regulation also stipulates that regarding workplace searches the employers should establish policies that clearly explain when searches on employees are warranted. They must communicate such policies to their employee and should make searches that are not heavily extensive or intrusive than necessary. They should also handle the information obtained from the search of care and store the evidence in a safe place.…

    • 932 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Question: Question 12 Answer: Staff Policies and procedures are there to ensure staffâ€TMs health and welfare are protected and that there rights are supported. Some policies…

    • 613 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Stefanik, Thompson, Khalabari, Vega December 12, 2016 House Bill No. __________ Patron–– § 1. Notwithstanding any other provision of law, no state or local government department, agency, or instrumentality having jurisdiction over criminal law enforcement or regulatory violations, including but not limited to the Department of State Police and any school division, and no department of law enforcement as defined in § 15.2-836 of the Code of Virginia of any county, city, or town shall purchase or deploy body-worn cameras before the department, agency or instrumentality has adopted and made available for public comment and review a policy for the deployment of such cameras that includes provisions implementing the following requirements: The…

    • 636 Words
    • 3 Pages
    Decent Essays