Host Security at LAB 

Octave findings:

 

  1. No accounts and passwords.
  2. Inaccurate inventory of computer systems, software, hardware, peripherals,
  3. No firewalls
  4. No encryption or secure information transfer
  5. There is no check on student ids - anyone can walk in and use a computer
  6. Internet is available to anyone walking in
  7. Accounts and passwords have no expiration date
  8. Administrator passwords are default vendor passwords.
  9. Inconsistent patch policy across systems
  10. Some hardware systems are outdated
  11. Student computers will store information on drive C only for that day then deleted when rebooting. However drive D will store information for the semester
  12. Users do not know to whom they should report security problems especially after hours
  13. Inconsistent logging on user systems
  14. No test environment and Informal testing methods, and not systematic.
  15. Only one person knows the domain password.

You have 45 minutes to complete the following

  1. Review the list of host security observations
  2. Make comments about each observation - for example, whether this is a serious problem, or not so serious, whether you would give this a priority or not, whether you would have to wait for availability of funds or not, etc.
  3. List what assets are vulnerable and what the potential impact on the organization if the assets were compromised. 
  4. What are the threats tot he confidentiality, integrity and/or availability of the assets.
  5. How could the threats be exploited?
  6. What means might an intruder use?
  7. What motive might the intruder have?
  8. How could you protect against the threats?
  9. From a Risk-Management point of view what would be the expected loss?
  10. What other observations or comments would you like to make?
Group #  
How many in the group?  
    email of member
Name of member 1
Name of member 2
Name of member 3
Name of member 4
Who is responsible for submitting this exercise?
  Comments
1 No accounts and passwords.

 

2 Inaccurate inventory of computer systems, software, hardware, peripherals,

 

3 No firewalls

 

4 No encryption or secure information transfer

 

5 There is no check on student ids - anyone can walk in and use a computer

 

6 Internet is available to anyone walking in

 

7 Accounts and passwords have no expiration date

 

8 Administrator passwords are default vendor passwords.

 

9 Inconsistent patch policy across systems

 

10 Some hardware systems are outdated

 

11 Student computers will store information on drive C only for that day then deleted when rebooting. However drive D will store information for the semester

 

12 Users do not know to whom they should report security problems especially after hours

 

13 Inconsistent logging on user systems

 

 

14 No test environment and Informal testing methods, and not systematic.

 

15 Only one person knows the domain password.

 

Home | 4990 Project 1 | 4990 Syllabus  | 4990 Class Schedule | HOMEWORK | Attendance |