This website uses cookies to ensure you have the best experience. Learn more

It Infrastructure Security Essay

1162 words - 5 pages

Unit 4 Assignment 1: Create a VPN Connectivity Troubleshooting Checklist

1. Find out who is affected
The first step in troubleshooting any VPN problem is to determine who is affected by it. That information can go a long way toward helping you figure out where to start looking for the problem. For example, if everyone in the company is having problems, you might look for a hardware failure on your VPN server, an incorrect firewall rule, or perhaps a configuration problem on your VPN server.
On the other hand, if there is only one person who is having a problem who can never seem to remember his/her password or Some other person who insists on connecting from their home computer, ...view middle of the document...

In one scenario, one of the users could be having trouble connecting to a VPN from a home computer. If you tried talking him through the problem, they kept telling you that what they were seeing didn't match what you were asking them to do. It turned out that the user had installed a freeware VPN client because a friend had told him it was much better than what he'd been using. On another occasion, I had someone who was unable to establish VPN connectivity because a virus had destroyed the computer's TCP/IP stack.

If users are attempting to connect from their own computer, you can't assume anything about the system they're using.
5. Try logging in locally
This probably sounds silly, but when users say that they are having trouble logging in to the VPN, one of the first things you do is verify that they can log in locally.
I once heard there was a user complaint of VPN problems. The troubleshooter spent a lot of time trying to troubleshoot the issue. When nothing they tried seemed to make any difference, they decided to double-check the user's account to see whether there were any restrictions on it. When they did, they noticed that the account was locked out. They unlocked the account and tried again, but it wasn't long before the account was locked again.
The troubleshooter reset the user's password and was able to log in without any problems. When they told the user about it, the user told the troubleshooter that he'd never been able to log in with that account. When the troubleshooter asked how he got his work done each day, he told him that he always logged in as one of his coworkers. (You can't make this stuff up.) Ever since that incident, the troubleshooter always checked to verify that the user's account is working properly.

6. See if affected users are behind NAT firewalls
Another thing one should check is whether affected users are connecting from computers that are behind a NAT firewall. Normally, NAT firewalls aren't a problem. However, some older firewalls don't work properly with VPN connections.
7. Check for Network Access Protection issues
Microsoft created the Network Access Protection feature as a way for administrators to protect network resources against remote users whose computers are not configured in a secure manner. Although Network Access Protection (NAP) works well, it has been known to...

Other Papers Like It Infrastructure Security

Impact Of Data Classification Standard Essay

596 words - 3 pages Impact of Data Classification Standard and Internal Use Only Data classification standard provides the means of how the business should handle and secure different types of data. Through security controls different data types can be protected. All these security controls should apply to each of every IT infrastructure in which it will state how the procedures and guidelines will guarantee the organization’s infrastructures security. This

Assignment 2 Critical Infrastructure Protection

1707 words - 7 pages ).  Critical infrastructure comprises of power, water, transportation, communication, assets, networks, and systems (physical and virtual).  CIP covers anything considered essential to the United States and that could cause incapacitation or devastation to the country and security if it were to be disrupted.  Critical personnel, equipment, systems, data, physical and virtual networks are protected by personnel in the public and private sectors.  Groups

Critical Infrastructure Protection

1373 words - 6 pages data is legitimate and correct, ensuring that data as though it were viewed as a stake. So what then, is "critical infrastructure protection"? The expression "critical infrastructure protection" (CIP) relates to the exercises for ensuring critical infrastructures. This incorporates individuals, physical holdings, and correspondence (digital) frameworks that are crucially essential for national, state and urban security, budgetary soundness, and

Title Is Awesome

1179 words - 5 pages IS 471 Policy Development and Security Issues Lab 4 (Due October 22, 2014) Introduction In any company, a security policy helps to mitigate the risks and threats the business encounters. However, unless a company happens to be in the information security industry, the task of identifying, assessing, and categorizing the myriad of risks can be an overwhelming one. Thankfully, a company’s IT infrastructure can be divided in a logical manner to

Itt 255 Lab 6

3922 words - 16 pages Course Summary Major Instructional Areas 1. Information Systems Security fundamentals 2. Seven domains of a typical Information Technology (IT) infrastructure 3. Risks, threats, and vulnerabilities found in a typical IT infrastructure 4. Security countermeasures for combating risks, threats, and vulnerabilities commonly found in an IT infrastructure 5. (ISC)2 Systems Security Certified Practitioner (SSCP®) Common Body of Knowledge – SSCP® domains

Private Security

1970 words - 8 pages refineries, financial centers, computer systems, dams, malls, railroad lines, and a multitude of other highly plausible and vulnerable terrorist targets. Dempsey even uses a quote from a former FBI deputy director who says, “The great majority of the critical infrastructure is not protected by sworn officers. You name any industry and you’re going to find private security elements protecting it.” That is quite a statement. Especially coming from

Computer Security In Education

330 words - 2 pages university at risk for lawsuits if the information is exposed. Student’s internet use on campus daily comes in contact with social network targeting, malicious software, infrastructure attacks, phishing, and peer-to-peer file transfers (Rasmussen, 2011). These dangers put not only the students’ computers at risk for security breaches, but the universities’ network as well. The damages resulting from data breaches in college networks are numerous. Not only

Principles of Security 5th Edition Chapter 1 Review Questions

844 words - 4 pages make a system weak and open to attacks without protection. 3. How is infrastructure protection (assuring the security of utility services) related to information security? If the infrastructure of a network is exposed and accessible to anyone this leaves the network vulnerable to damage both to hardware and software. The infrastructure must be protected to allow only authorized user to have access to the network. 4. What type of

Could Computing Research

528 words - 3 pages • Empowerment of end-users of computing resources by putting the provisioning of those resources in their own control, as opposed to the control of a centralized IT service (for example) • Agility improves with users' ability to re-provision technological infrastructure resources. • Application programming interface (API) accessibility to software that enables machines to interact with cloud software in the same way the user interface

Introduction to Information Security Student

1249 words - 5 pages IT414 - Principles of Information Security Sherwin R. Pineda Introduction to Information Security Do not figure on opponents not attacking; worry about your own lack of preparation. Learning Outcomes 嗗Define information security 嗗Recount the history of computer security, and explain how it evolved into information security 嗗Define key terms and critical concepts of information security Introduction 嗗The History of Information

Chapter 1 Review Questions

870 words - 4 pages protection (assuring the security of utility services) related to information security? A. Both infrastructure protection and information security share the same overall goal, which is to ensure that data is available when, where and how it is needed. 4. What type of security was dominant in the early years of computing? A. Early security was entirely physical security. 5. What are the three components of the C.I.A. Triangle? What are they used

Related Essays

Window Of Vulnerability Essay

290 words - 2 pages seven layers of the IT infrastructure that are affected by the   “use only “data standards and how it affects the domain and the security that was set forth by Richman Investments . The user domain is just one layer of the IT infrastructure that “use only” standard affected. It’s the first layer and also the weakest link in the infrastructure.   Personal information is created in this domain that is obtained for internal use only. The Work

It456 Db2 Essay

744 words - 3 pages effective scalable network security system requires proper design according to the risk analysis and employing security principles in best practices and maintaining a satisfactory level of compliance. Should any of the key areas of the security infrastructure be compromised it will have devastating effects on the reliability, availability, viability of operational abilities and integrity of data. As well the system

Linux Security Essay

448 words - 2 pages Linux Security Project Part 1 Instructor Sandro Tuccinardi Student Brian Dupee Security Policy Outline First World bank wants to provide banking services online to its customers. The institution estimates over $100,000,000 a year in online credit card transactions for loan applications and other banking services. According to a team that was formed using a Linux an open source infrastructure would roughly as

E Governance Essay

564 words - 3 pages . As part of the Infrastructure Assessment Framework, there are several individual assessments that we can provide for you in order to better understand and orient your key business drivers with your current IT infrastructure and proposed roadmaps. Some of the key assessment frameworks that we can deliver for you are : •Technology Assessment •Security Assessment We have several more customized frameworks for specific needs and