Host Security at SunBank

Octave findings:

 

  1. No inventory of computer systems, software, peripherals, etc.
  2. Inconsistent host configurations - especially laptops 
  3. No firewalls
  4. No encryption or secure information transfer
  5. Accounts and passwords have no expiration date
  6. Default accounts have vendor passwords.
  7. No technology or policy to enforce strong passwords.
  8. Inconsistent patch downloads across systems.
  9. Users do not know to whom they should report security problems especially after hours
  10. No test environment
  11. Informal testing methods, and not systematic.
  12. Only head of IT knows the domain password.
  13. Administrator passwords are default vendor passwords.
  14. Some hardware systems are outdated
  15. Inconsistent logging on user systems

You have 45 minutes to complete the following

  1. Review the list of host security observations
  2. Make comments about each observation - for example, whether this is a serious problem, or not so serious, whether you would give this a priority or not, whether you would have to wait for availability of funds or not, etc.
  3. List what assets are vulnerable and what the potential impact on the organization if the assets were compromised. 
  4. What are the threats tot he confidentiality, integrity and/or availability of the assets.
  5. How could the threats be exploited?
  6. What means might an intruder use?
  7. What motive might the intruder have?
  8. How could you protect against the threats?
  9. From a Risk-Management point of view what would be the expected loss?
  10. What other observations or comments would you like to make?
Group #  
How many in the group?  
    email of member
Name of member 1
Name of member 2
Name of member 3
Name of member 4
Who is responsible for submitting this exercise?
  Comments
1 No inventory of computer systems, software, peripherals, etc.

 

2 Inconsistent host configurations - especially laptops 

 

3 No firewalls

 

4 No encryption or secure information transfer

 

5 Accounts and passwords have no expiration date

 

6 Default accounts have vendor passwords.

 

7 No technology or policy to enforce strong passwords.

 

8 Inconsistent patch downloads across systems.

 

9 Users do not know to whom they should report security problems especially after hours

 

10 No test environment

 

11 Informal testing methods, and not systematic.

 

12 Only head of IT knows the domain password.

 

13 Administrator passwords are default vendor passwords.

 

 

14 Some hardware systems are outdated

 

15 Inconsistent logging on user systems

 

Home | 4990 Project 1 | 4990 Syllabus  | 4990 Class Schedule | HOMEWORK | Attendance |