part 3

Published on Slideshow
Static slideshow
Download PDF version
Download PDF version
Embed video
Share video
Ask about this video

Scene 1 (0s)

[Virtual Presenter] We understand that data hiding is important when viewing system logs as they may contain personally identifiable information such as the username IP address action performed and application responses. To protect this information from being shared outside of an organization it is important to ensure that certain information is not visible. Obfuscation or removal of this information may be necessary before subsequent use. Users with special privileges need to have access rights that only cover their job duties to avoid accessing resources they do not need. All networks feature such users to ensure that access is granted appropriately. When granting additional access rights to users it is crucial to check the effective access rights. This is especially important when multiple policies are applied to a single user as overwriting policies may occur. It is recommended to remove special privileges from accounts as soon as they are no longer required. The Active Directory User Management tool integrated into Windows Servers can help administrators manage user accounts and access rights effectively. This tool can ensure that users have the minimum level of access required to do their job while protecting sensitive information..

Scene 2 (1m 16s)

[Audio] We must ensure that data hiding is necessary when viewing logs as system logs can include personally identifiable information. Users with special privileges need to be granted access rights that only cover their job duties. It is important to check the effective access rights before granting additional rights and to remove special privileges when they are no longer required. The Active Directory User management tool in Windows Servers can help keep users organized. Testing and reviewing protection is crucial for any security policy. A firewall test strategy should cover all areas of the implementation of the firewall. For example the implementation of the equipment – is it in the correct location or does it only provide protection for some areas of the network? Do the firewall rules work as intended? If you have a rule to block connections to a specific application does it actually achieve this? Sometimes applications have back-up hosts in the event that the main host can’t be contacted. It is important to test for any known flaws ensure that all patches are installed and that the default configuration properties are secure enough. A penetration test can help with this. Regular system scans should be part of any security policy and should be scheduled to occur automatically. The purpose of a system scan is simply to ensure that there is nothing stored that has evaded initial virus scanning. It is wise to schedule full system scans to take place outside of normal office hours as scanning every file on a system can be extremely time-consuming and processor-intensive. For more information on firewall testing system scans and other security topics visit the link at the top of this page..

Scene 3 (2m 57s)

[Audio] We are network administrators responsible for ensuring the security of our network. A port scanner examines all IP addresses within a specified range and scans all ports to identify the devices listening on those ports. This information can be an important first step when trying to attack a network so it is also an important step in securing a network. There are many network testing tools available each with its own set of features and capabilities. Some popular tools include KaliOS and Nmap. To ensure that your network is secure it is essential to regularly test and monitor it for vulnerabilities. This can involve running network scanning tools inspecting network traffic and reviewing system logs for signs of suspicious activity. In order to make recommendations for improving network security it is crucial to have a clear understanding of the current state of your network and the potential threats that could impact it. Network testing tools can help you identify vulnerabilities and evaluate the effectiveness of your current security measures..