• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Ethical Hacking

Wade Mackey

Ethical Hacking

MIS 5211.702 ■ Fall 2020 ■ Wade Mackey
  • Home
  • About
  • Syllabus
  • Gradebook

Question to discuss with classmates

August 29, 2020 by Akshay Shendarkar 3 Comments

What popular devices or techniques can you suggest IT Auditors/security professionals to check the hardening of or to audit network devices?

Filed Under: Uncategorized Tagged With:

Reader Interactions

Comments

  1. Anthony Messina says

    August 29, 2020 at 9:51 pm

    This is a great question. While I have only been in infosec for a year, I think one of the most important devices to check for hardening is the firewall. The firewall is the gatekeeper to your environment. All firewall rules should be inspected and peer reviewed to ensure they allow the correct traffic in. One bad configuration in a firewall rule is all an attacker needs. One of the biggest no-nos I have seen in a firewall configuration is an “any, any, any” rule. This is a rule that allows any IP address in, to any IP address in the environment, to any port they wish.

    Log in to Reply
  2. Rudraduttsinh says

    August 30, 2020 at 12:59 pm

    Great question, Akshay! I have been following this story very closely since this affects me. One of the solutions which could have prevented the attack would be two-factor-authentication. Where you are required to have a key or device, in this particular case, the Canadian government focused on keeping the keeping system accessible to all the Canadians. Hence, there was not any two-factor-authentication in place. Further, there needs to be education amongst the people regarding modern security threats. Be it the changing of password regularly and monitoring of account activity.

    Log in to Reply
  3. Chidiebele Okosi says

    August 30, 2020 at 1:29 pm

    I would like to say that this ‘Depends”, first the business , budget, type of information and information systems.
    For security assessment, some tools that can be put to use are Vulnerability tools such as SIEM tools LogRythm, Nexpose , AppScan that can be used to scan the network, capture the logs of all the servers on the network, to ensure that patches are up-to-date and identify services that might have running on the network such as open ports open, services, users and rights that exists on each server. .
    A good way to start is to have a baseline and then compare that baseline to what you have on the network to determine what measures you have to take towards protection.

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • Uncategorized (46)
  • Week 01: Overview (3)
  • Week 02: TCP/IP and Network Architecture (6)
  • Week 03: Reconnaisance (5)
  • Week 04: Network Mapping and Vulnerability Scanning (11)
  • Week 05: Metasploit (10)
  • Week 06: More Metasploit (4)
  • Week 07: Social Engineering (7)
  • Week 08: Malware (6)
  • Week 09: Web Application Hacking (7)
  • Week 10: SecuritySheperd (6)
  • Week 11: Intro to Dark Web and Intro to Cloud (4)
  • Week 12: Introduction to Wireless Security with WEP and WPA2 PSK (7)
  • Week 13: WPA2 Enterprise and Beyond WiFi (3)
  • Week 14: Jack the Ripper, Cain and Able, and Ettercap (4)

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in