Security Risk Analysis and Assessment Report

1101 Words3 Pages

All of the operating system (OS) log files were examined for any suspicious activity. The event logs which were searched were application, security, setup, system, as well as applications and services. According to Sunil Gupta (2013), “Windows has the ability to generate a detailed audit record of security events on each system. Windows logs events for the two types of security Accounts: Computer and User for their logon and authentication “(p.21). The application log was searched for errors and events of programs and applications. Security logs were checked for log-ins to the device and the manipulation of files and folders. Setup logs were searched for information on what programs were installed on the device. System logs provided information on the functioning of Windows OS components. Finally, because all of the laptops examined were using Windows 7, applications and services logs were examined for more fine-grained logging of events from individual components.
Network intrusion poses a threat to the information that is contained on the servers and devices that reside on the internal network. From inside and outside the network, the port scanner snort was used to probe the network for unused, but open ports, which could potentially become the vector of a network breach. From within the network, this was done to be comprehensive in the evaluation. From outside the network the scan was done to see the issue from the perspective of an outsider. Wireshark, a network sniffer, was used from within the network to analyze network traffic as it traversed the network. The program captures traffic in real time for analysis. The captured data can be preserved for immediate or future analysis. The data that was captured was checked for ...

... middle of paper ...

...ov/publications/securing-your-web-browser
Gupta, S. (2013). Windows Logon Forensics. Retrieved March 30, 2014 from https://www.sans.org/reading-room/whitepapers/forensics/windows-logon-forensics-34132
Hadnagy, C. (n.d.). Social Engineering (SE) is both incredibly complex and amazingly simple. Retrieved March 30, 2014 from http://www.social-engineer.org/
Higgins, K. (2012). Five Significant Insider Attacks Of 2012. Retrieved March 30, 2014 from http://www.darkreading.com/vulnerabilities---threats/five-significant-insider-attacks-of-2012/d/d-id/1138865?
Maras, M. (2012). Computer Forensics: Cybercriminals, Laws, and Evidence. Sudbury. Jones and Bartlett Learning LLC.
National Institute of Standards and Technology. (2012). SP800-30 Guide for Conducting Risk Assessments. Retrieved March 30, 2014 from http://csrc.nist.gov/publications/nistpubs/800-30-rev1/sp800_30_r1.pdf

More about Security Risk Analysis and Assessment Report

Open Document