16.2.6 Lab – Research Network Security Threats (Answers)


Objectives for the 16.2.6 Lab on Researching Network Security Threats
Part 1: Look around the SANS website 
Part 2: Recognize recent threats to network security
Part 3: Describe a Particular Network Security Threat's History and Situation
An administrator must recognise external dangers that endanger the network in order to protect it against assaults. Websites dedicated to security may be used to spot new threats and provide network defence methods.

SysAdmin, Audit, Network, Security is one of the most well-known and reliable websites for fighting off threats to computer and network security (SANS). The SANS website offers a variety of services, including the weekly @Risk: The Consensus Security Alert email and a list of the top 20 Critical Security Controls for Effective Cyber Defense. This newsletter describes recent network vulnerabilities and assaults.

In this lab, you will find the SANS website, browse it, utilise it to find current network security dangers, investigate additional websites that detect threats, find out about a particular network assault, and present your findings.

Resources Necessary
internet-connected gadget
PowerPoint or other presentation software installed on a presentation machine
Instructions
Exploring the SANS website in Part 1
Visit the SANS website and look at the resources there in Part 1.

First, look for SANS materials.
SANS may be found online. Click on the FREE Resources link on the SANS homepage.

Name three resources that are on hand.

The Top 25 Software Errors, 20 Critical Controls, Newsletters, Blogs, Reading Room, Webcasts, and Security Policies

Locate the CIS Critical Security Controls link in Step 2.
The Department of Defense (DoD), National Security Association, Center for Internet Security (CIS), and SANS Institute collaborated on the CIS Critical Security Controls, which are linked on the SANS website. The ranking was created to help the DoD budget for and prioritise cyber security measures. It now serves as the focal point of the US government's successful security initiatives. Choose Critical Security Controls or a comparable option from the Resources menu. The Center for Internet Security (CIS) website hosts the Critical Security Controls paper, which may be accessed by registering for free. The 2014 SANS Critical Security Controls Poster, which offers a short summary of each control, is available for download through a link on the CIS Security Controls website at SANS.

Choose a control, then provide implementation ideas for that control.

Answers will differ. Protection against malware is Critical Control 5. Continuously monitor workstations, servers, and mobile devices by using automated technologies. Use signature auto-update functions and anti-malware software. Set up network PCs so that material from removable media won't automatically execute.

Locate the Newsletters menu in step 3.
Choose Newsletters from the Resources menu by highlighting it. Give a brief description of each of the three accessible newsletters.

Answers will differ.

SANS NewsBites is a semiweekly high-level executive overview of the most significant news stories on computer security that have been published during the previous week. Each news article provides a very short summary as well as, if available, a link to further in-depth material on the web.

@RISK offers a dependable weekly review of (1) recently identified attack vectors, (2) vulnerabilities with live new exploits, (3) perceptive analyses of how previous assaults transpired, as well as other important information.

The most popular free security awareness newsletter in the world is called OUCH!, and it is created for regular computer users. Each issue of Securing The Human is meticulously produced and studied by the SANS Securing The Human team, SANS instructor subject matter experts, and team members of the community before being released each month in a variety of languages. Each issue focuses on a different subject and offers concrete advice on how readers may safeguard their organisations, families, and personal lives.

Identify Current Network Security Threats in Part 2
You will use the SANS website to study current network security concerns in Part 2 and find other websites that include security threat information.

Find the @Risk: Consensus Security Alert Newsletter Archive as the first step.
Choose @RISK: The Consensus Security Alert Archive from the Newsletters page. Go to Archives Volumes and choose a current weekly newsletter by scrolling down. Review the sections on the Most Popular Malware Files and Notable Recent Security Issues.

Name a few recent weaknesses. If required, peruse many recent newsletters.
Answers will differ.

Step 2: Find websites that provide information on the latest security threats.
Find a few more websites that provide up-to-date security threat information outside the SANS website.
Answers will differ.

Name a few of the most current security risks mentioned on these sites.
Answers will differ.

Detail of a Particular Network Security Attack in Part 3
You will do research on a particular network attack that has happened in Part 3 and then put together a presentation based on your findings. Based on your discoveries, complete the form below.

Step 1 is to fill out the ensuing form for the chosen network assault.
Step 2: Finish the presentation according to the instructor's instructions.
1. What precautions can you take to safeguard your own computer?

the use of a personal firewall, setting up passwords for system and bios access, configuring screensavers to time out and require a password, protecting crucial files by making them read-only, encrypting confidential files and backup files for safety, and keeping the operating system and applications up to date with patches and service packs, etc.

2. What crucial actions should businesses take to safeguard their resources?

The usage of firewalls, intrusion detection and prevention, hardening of network devices, endpoint protection, network vulnerability tools, user education, and security policy formulation are a few potential responses that will differ.

Comments

Popular posts from this blog

🌍 Unlock Your Research Potential with the AfOx Visiting Fellowship at Oxford University!

**MIT Africa Empowering the Teachers Fellowship 2026 – Fully Funded Opportunity for Engineering Professors**

Launch Your Career with Chevron: 2025 Internship Program Now Open for Nigerian Students