DIY Chatroom Home Improvement Forum

DIY Chatroom Home Improvement Forum (https://www.diychatroom.com/)
-   Networking (https://www.diychatroom.com/f11/)
-   -   Looking To Get Some Info And Real World Corporate Examples On Security... (https://www.diychatroom.com/f11/looking-get-some-info-real-world-corporate-examples-security-392409/)

Sean Price 04-29-2016 08:48 PM

Looking To Get Some Info And Real World Corporate Examples On Security...
 
I am looking for some input from people that actually work in Information Technology in a Security type of position.


I am looking for their input and real work examples on the below defintions..


Again, I am looking to have people that actually work in IT/IS Security answer these...


Definitons and Real World Examples PLEASE:


example:

VPN = virtual private network, think of a tunnel within in a tunnel type of secure connection..
At my job we use a Juniper client and I support it by.........??????


Load Bearing -


SIEM -


Endpoint Protection -



VPN -


Firewalls -



IDS/IPS -



SSL -


Vulnerability Scanning Tools -

Guap0_ 12-04-2017 07:24 PM

Re: Looking To Get Some Info And Real World Corporate Examples On Security...
 
The only IT experience that I have is being a sysadmin for a small mortgage company. However, real life security examples are plentiful. One of the most recent breaches was Equifax & I believe that Life Lock is a subsidiary, of them. They use Apache web server software but failed to apply the most recent security patch which would have prevented the breach. Are hackers the only people reading the alerts?

Then you mentioned VPNs. They hide your IP address. If you connect to my server, the IP address that I see in my log files won't be yours. That's true for any proxy that you might use. If there is an attack from that IP & the owners of the VPN don't keep logs, law enforcement won't be able to find the attacker. VPN owners may or may not log connections or may say that they don't but really do.

An IDS is an intrusion detection system which blocks connections when certain criteria is met. You can set the criteria. For example, a port scan. If someone is scanning for opened ports, it will alert you.

Firewalls are based on rule sets that you set. Allow & Deny. Example, Allow all - Deny ports 21, 22, 1024 to 65535 OR more likely Deny all - Allow 80 (web server)

Scanning Tools - The most famous free port scanner is nmap. You can scan all the ports with an amazing list of options. It too much to type here.

Core Impact costs $30,000 used by professional penetration testers. It does more than scans ports.

Those are some basics.

Guap0_ 12-04-2017 07:26 PM

Re: Looking To Get Some Info And Real World Corporate Examples On Security...
 
I just realized how old that post was. oops.


All times are GMT -5. The time now is 08:36 PM.

Powered by vBulletin® Version 3.8.8
Copyright ©2000 - 2019, vBulletin Solutions, Inc.
User Alert System provided by Advanced User Tagging (Pro) - vBulletin Mods & Addons Copyright © 2019 DragonByte Technologies Ltd.
vBulletin Security provided by vBSecurity v2.2.2 (Pro) - vBulletin Mods & Addons Copyright © 2019 DragonByte Technologies Ltd.