Perimeter defense techniques

Evaluate the types of assessments, select one that you might use, and explain why it is important.

Of the top eight areas to research when conducting an assessment, select no less than three and explain how one should approach the research and why it should be approached that way.

Active Assessment

Passive Assessment

External Assessment

Internal Assessment

Host-based assessment

Application

Wireless network assessment

Vulnerability Assessment

Full Answer Section

     
  • Internal Assessment: This is conducted by the organization itself. It allows for customization to specific needs but may lack objectivity. (Useful for ongoing monitoring and cost-effectiveness)
Choosing an Assessment: Let's say you're tasked with securing a company's wireless network. A good choice might be a combination of:
  1. Passive Assessment (Network Scanning): This can be a non-intrusive first step to identify basic network information like devices connected, access points, and potential vulnerabilities.
  2. Active Assessment (Wireless Penetration Testing): This simulates a real-world attack to identify exploitable weaknesses in the network security. This provides a deeper understanding of security posture but requires careful planning and execution to avoid disrupting network operations.
Researching for Network Assessments: Here are three key areas to research for a network assessment and how to approach them:
  1. Vulnerabilities:
    • Approach: Research known vulnerabilities in network devices, operating systems, and wireless protocols used in your network. Utilize reputable security databases and vendor advisories.
    • Why: Focusing on known vulnerabilities allows you to identify exploitable weaknesses and prioritize patching or mitigation strategies.
  2. Regulations and Compliance:
    • Approach: Research industry standards and regulations related to data security and network protection.
    • Why: Understanding compliance requirements ensures your network assessment addresses areas necessary to meet regulatory obligations. This is crucial for avoiding legal ramifications and protecting sensitive data.
  3. Security Best Practices:
    • Approach: Research best practices for securing wireless networks. This includes proper access point configuration, encryption protocols, and user authentication methods. Reliable sources include industry whitepapers, security organizations' recommendations, and vendor documentation.
    • Why: Security best practices represent essential measures to protect your network and data. Aligning your assessment with these practices ensures a comprehensive evaluation of your network's security posture.
By combining different assessment types and conducting thorough research, you can gain a clear understanding of your network's vulnerabilities and implement effective security measures.  

Sample Answer

     

There are several types of assessments used for various purposes. Here's an evaluation of some common ones:

  • Active Assessment: This involves actively testing a system for vulnerabilities or functionality. It often requires direct interaction with the system and can be disruptive. (Useful for identifying specific vulnerabilities)
  • Passive Assessment: This involves gathering information about a system without directly interacting with it. It's less intrusive but may not provide as much detail. (Useful for initial reconnaissance and identifying broad security gaps)
  • External Assessment: This is conducted by a third-party organization to provide an objective perspective. It can be valuable but can also be expensive. (Useful for unbiased evaluation and regulatory compliance)