Security Audit Tools Project. CT 395 IT Security I Professor Igbeare Summer Quarter 2009 August 25, 2009.

Slides:



Advertisements
Similar presentations
Configuring Windows to run Dr.Web scanner remotely.
Advertisements

Configuring Windows Vista Security Lesson 8. Skills Matrix Technology SkillObjective DomainObjective # Setting Up Users Configure and troubleshoot parental.
AVG Internet Security 7.5 Product presentation.
AVG 8.5 Product Line Welcome to a safe world …. | Page 2 Contents  Components Overview  Product Line Overview  AVG 8.0 Boxes.
Introducing Kaspersky OpenSpace TM Security Introducing Kaspersky ® OpenSpace TM Security Available February 15, 2007.
How to avoid Viruses and Malware on your Computer Use a firewall Using a firewall is like locking the front door to your house—it helps keep intruders.
A Technical Overview of Microsoft Forefront Client Security (FCS) Howard Chow Microsoft MVP.
Defense-in-Depth Against Malicious Software Jeff Alexander IT Pro Evangelist Microsoft Australia
Microsoft Security Resources. URL’s for this talk All URL’s mentioned in this talk can be found here: All URL’s mentioned in this talk can be found here:
By Joshua T. I. Towers $13.3 billion was the direct cost of malware for business in 2006 “direct costs are defined as labor costs to analyze, repair.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 9 Performing Vulnerability Assessments.
How Clients and Servers Work Together. Objectives Learn about the interaction of clients and servers Explore the features and functions of Web servers.
Microsoft Baseline Security Analyzer INLS 187 Security Software Presentation by Hinár György Polczer
Small Business Security By Donatas Sumyla. Content Introduction Tools Symantec Corp. Company Overview Symantec.com Microsoft Company Overview Small Business.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 11 Managing and Monitoring a Windows Server 2008 Network.
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
1 Panda Malware Radar Discovering hidden threats Technical Product Presentation Name Date.
IT:Network:Microsoft Applications
Task Scheduler Pro Managing scheduled tasks across the enterprise Joe Vachon Sales Engineer.
Principles of Computer Security: CompTIA Security + ® and Beyond, Second Edition © 2010 Baselines Chapter 14.
1 GFI LANguard N.S.S VS NeWT Security Scanner Presented by:Li,Guorui.
Securing Operating Systems Chapter 10. Security Maintenance Practices and Principles Basic proactive security can prevent many problems Maintenance involves.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.

Windows XP End of Life Microsoft support for Windows XP SP3 and Office 2003 ends April 8, 2014.
Tutorial 11 Installing, Updating, and Configuring Software
systemhound © Raxco Software Belgium systemhound PC inventory software.
Module 4: Add Client Computers and Devices to the Network.
Networking Security Chapter 8 powered by dj. Chapter Objectives  Explain various security threats  Monitor security in Windows Vista  Explain basic.
Virus & Anti-Virus Itthiwat Phiphopsukhawadee M.2/7 No.5 Saranpat Prasertthum M.2/7 No.17 Korakrit Laotrakul M.2/7 No.23 Pesan Kasemkitjanuwat M.2/7 No.25.
Hands-On Microsoft Windows Server 2003 Administration Chapter 2 Managing Windows Server 2003 Hardware and Software.
Spyware and Viruses Group 6 Magen Price, Candice Fitzgerald, & Brittnee Breze.
®® Microsoft Windows 7 Windows Tutorial 5 Protecting Your Computer.
CIS 460 – Network Design Seminar Network Security Scanner Tool GFI LANguard.
Honeypot and Intrusion Detection System
User Manager Pro Suite Taking Control of Your Systems Joe Vachon Sales Engineer November 8, 2007.
The Microsoft Baseline Security Analyzer A practical look….
Home Help Facilities. How to contact us. What we do. What we don’t do. What we have done.
MCTS Guide to Microsoft Windows Server 2008 Applications Infrastructure Configuration (Exam # ) Chapter Four Windows Server 2008 Remote Desktop Services,
Eng. Hector M Lugo-Cordero, MS CIS4361 Department of Electrical Engineering and Computer Science February, 2012 University of Central Florida.
Return to the PC Security web page Lesson 5: Dealing with Malware.
Security Assessment Tools Paula Kiernan Senior Consultant Ward Solutions.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 9 Performing Vulnerability Assessments.
.  Define risk and risk management  Describe the components of risk management  List and describe vulnerability scanning tools  Define penetration.
Jeny Carrasco and Jai Nayar English 393 Process Manual Assignment 12/08/04 McAfee 7.1 Process Manual.
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 14: Windows Server 2003 Security Features.
Vulnerability Scanning Vulnerability scanners are automated tools that scan hosts and networks for known vulnerabilities and weaknesses Credentialed vs.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
NetTech Solutions Supporting Users and Troubleshooting Desktop Applications on Microsoft Windows XP Instructor Richard Fredrickson.
Retina Network Security Scanner
NetTech Solutions Protecting the Computer Lesson 10.
IS493 INFORMATION SECURITY TUTORIAL # 1 (S ) ASHRAF YOUSSEF.
How to Mitigate Stay Safe. Patching Patches Software ‘fixes’ for vulnerabilities in operating systems and applications Why Patch Keep your system secure.
Windows Small Business Server 2003 R2 Powering Small Businesses.
TECHDOTCOMP SUPPORT TECHDOTCOMP nd Ave, Seattle, WA 98122, USA Phone:
John Samuels October, Why Now?  Vista Problems  New Features  >4GB Memory Support  Experience.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
GFI LANguard Matt Norris Dave Hone Chris Gould. GFI LANguard: Description Through the performances of the three (3) cornerstones of vulnerability management:
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
Welcome to Xandros Desktop Version 2.0. What is Xandros? The New Standard – Xandros is the award winning new standard for Desktop Operating System software.
Which is better Avast Free Edition or Avast Pro Version?
Chapter 1 Objectives Understand the History of Windows Over the Last 20-Plus Years. Compare and Contrast the Available Editions of Windows 7. Understand.
Computer Virus and Antivirus
Call AVG Antivirus Support | Fix Your PC
Norton customer support Number
Information Security Session October 24, 2005
Connecting Remotely Winter 2014.
Microsoft Virtual Academy
Presentation transcript:

Security Audit Tools Project

CT 395 IT Security I Professor Igbeare Summer Quarter 2009 August 25, 2009

CT 395 Team B Ann Curran Steven Hoy Amy Bridges Jeffrey Broomall Jeanne Goss Jesse Holt

Retina Network Security Scanner Tool s/retina/download.htm?id=

* designed to run on Windows 2000, XP or 2003 systems * also has the capability of auditing non-Windows devices such as UNIX, Linux, Cisco and other devices * identifies and prioritizes vulnerabilities it finds on a system * provides best practice information in regards to auditing, policy practices, and operating system security * to start a vulnerability scan, a target IP address, filename, job, audit selections, port selections, options, and credentials that have administrative rights must be providedd Retina Network Security Scanner Tool

Reporting Options Available The Reports menu offers 4 different reports * the Executive option (shown below) lists the quantity of vulnerabilities in the order of High, Medium, Low, and Informational, generally a good scan for management to use as an indication on how secure a system is without too much technical information Retina Network Security Scanner Tool

Reporting Options Available (cont’d) The Remediate menu offers 1 detailed remediation report more technical information is displayed to assist a security administrator Retina Network Security Scanner Tool

Microsoft Baseline Security Analyzer us/security/cc aspx#ETB

* designed for small to medium business * useful for standalones computers and home networks * scans computer(s) for misconfigurations, missing patches and updates, and other administrative vulnerabilities * uses Windows Update Advisor and Windows Server Update Service to create a checklist * a synced security and update tool that keeps your Windows environment on the cutting edge and one step ahead of malicious programs and their creators *works for key components of the Microsoft Windows environment, including Microsoft Office, Internet Explorer, and Microsoft Outlook. *compatible with Windows operating systems, as far back as Windows 2000 Server * easily attainable, very user friendly Microsoft Baseline Security Analyzer

* the IP address of the computer to be scan must be entered * choose the desired parameters for the scan Windows administrative vulnerabilities weak passwords IIS administrative vulnerabilities SQL administrative vulnerabilities * simple and effective program * user-friendly and functions like other Windows applications * should be used with an effective security strategy that involve both hardware and software Microsoft Baseline Security Analyzer

AVG Antivirus Program

* antivirus software solution * extremely efficient in detecting infected files * scanning engine uses three methods of virus detection *Works with Windows 2000, Windows XP, Windows XP Pro x64 Edition, Windows Vista, and Windows Vista x64 Edition * features of AVG Anti-virus Scanner Anti-Spyware Anti-Rootkit Link Scanner Web Shield ResidentShield Update Manager License

Sunbelt Network Security Inspector _ &ontId=2651_4&spi=9a20b741ab1774d4fa5a8b adda56ff73&lop=link&ltype=dl_d lnow&pid= &mfgId=106327&merId=106327&pg uid=3uSGjgoPjF4AACZLsbIAA AAM&destUrl=http%3A%2F%2Fdownload.cnet.com%2F _ html%3Fspi%3D9a20b741ab1774d4fa5a8badda 56ff73

* an enterprise tool designed to work with large domains * looks at the domain specified on the local machine that is running SNSI

Scan Results - a list of all identified vulnerabilities will be displayed, sorted by risk level to bring the most important vulnerabilities to the attention of the user Sunbelt Network Security Inspector

Project Summary all tools evaluated proved beneficial for protecting networks and computers beneficial and user friendly for network security professionals, as well as general computer users an arsenal of security tools is necessary for complete protection one product does not do it all favorite security tool evaluated AVG antivirus program installing an anti-virus program and keeping definition files up-to- date is an extremely important in keeping computers and networks secure from the myriad of vulnerabilities that exist functional anti-virus product that can be obtained free

Future Implications allow more efficient IT personnel proactive in monitoring and defending their networks instead of repairing down networks from intentional hackers and/or uneducated users required to protect networks insurgence of malware, viruses, and intruding hackers an arsenal of security products is necessary to protect networks Security Audit Tools

End Notes AVG Antivirus and Security Software. (2009). Retrieved August 2009, from Download AVG Trial Version for Free: Linkedin. (2009). Retrieved August 2009, from eEye Digital Security: Microsoft Discussion Groups. (2009). Retrieved August 8, 2009, from Discussions in Security Baseline Analyzer: default.aspx?dg=microsoft.public.security.baseline_analyzer Microsoft Technet. (2008, May 5). Retrieved August 8, 2009, from Microsoft Baseline Security Analyzer 2.1: Microsoft Technet. (2009). Retrieved August 2009, from Microsoft Baseline Security Analyzer - Legacy Product Support: Sunbelt Network Security Inspector. (2009, August). Retrieved August 2009, from SC Magazine: Sunbelt Network Security Inspector. (2009, August). Retrieved August 2009, from CNET download.com: &ontId=2651_4&spi=9a20b741ab1774d4fa5a8badda56ff73&lop=link&ltype=dl_d lnow&pid= &mfgId=106327&merId=106327&pguid=3uSGjgoPjF4AACZLsbIAAAA M&destUrl=http%3A%2F%2Fdownload.cnet.com%2F3001-