Télécommunications

Layered Security Introduction (Cyber Security Part 4)

Support Silicon Dojo at:
https://www.donorbox.org/etcg

Home

Layered Security Introduction
Layering Security
Got Root?
Site Survey and Initial Audit
What are we looking at?
Verify what you are told is true is in fact true.
Communicate with all parties and make sure everyone is on the same page.
Security is as much ART as it is a Science.
“Good Security” is in the eye of the check writer…
Operational Security
Securing HOW your organization runs
Physical Security
Locks
Doors
Walls
Patch Management
Update OS, Software, Firmware on computers, servers AND DEVICES
Patch Management Solutions
Software Privileges
Keep people from modifying records
Accounts Within
Quickbooks
Database Apps
Security Policy
OS Level Security
Active Directory is AMAZEBALLS
Lock down abilities to:
Change network settings
Install Software
Use USB ports
Sharing Permissions
Do you have permission to delete the folder that contains the database that you don’t have permission to login to?
Password Policy / Multi Factor Authentication
DON’T CHECK YOUR EMAIL WITH AN ADMIN ACCOUNT!!!
Expiration Time Period
Password Reuse
Password Complexity
Antivirus / Antimalware/ Antispyware
Verify what your solution does
Central Management
Proper License?
Scaleable?
Standardization
Firewalls
Make sure you don’t break something
Make sure you understand your environment
Should you use a Firewall, or turn off server services (Should SSH be available?)
Layered Networking
Siloing Servers
Subnet Logical Business Units or Physical Locations
Parallel Networking in “Converged” Environments
Understand how VLANs work and Vulnerabilities in your equipment
Services
Server Services
FTP
HTTP
VPN
Administrative Services
SNMP
ICMP
Backups
Not necessarily to tape
Backup of Database tables
Disaster Recovery
How long until services are accessible?
Failover
DRaaS
Intrusion Detection
Honey Pots
Systems to detect intrusions and issues
Service Agreements
HELP!!!
Auditing
Never Stop Auditing!

Views : 6995
cyber security

Source by Eli the Computer Guy

Mourad ELGORMA

Fondateur de summarynetworks, passionné des nouvelles technologies et des métiers de Réseautique , Master en réseaux et système de télécommunications. ,j’ai affaire à Pascal, Delphi, Java, MATLAB, php …Connaissance du protocole TCP / IP, des applications Ethernet, des WLAN …Planification, installation et dépannage de problèmes de réseau informatique……Installez, configurez et dépannez les périphériques Cisco IOS. Surveillez les performances du réseau et isolez les défaillances du réseau. VLANs, protocoles de routage (RIPv2, EIGRP, OSPF.)…..Manipuler des systèmes embarqués (matériel et logiciel ex: Beaglebone Black)…Linux (Ubuntu, kali, serveur Mandriva Fedora, …). Microsoft (Windows, Windows Server 2003). ……Paquet tracer, GNS3, VMware Workstation, Virtual Box, Filezilla (client / serveur), EasyPhp, serveur Wamp,Le système de gestion WORDPRESS………Installation des caméras de surveillance ( technologie hikvision DVR………..). ,

Laisser un commentaire

Votre adresse e-mail ne sera pas publiée. Les champs obligatoires sont indiqués avec *