Vulnerability Assessment Report

Back to Vulnerbility Assessment System Description The server hardware consists of a powerful CPU processor and 128GB of memory. It runs on the latest version of Linux operating system and hosts a MySQL database management system. It is configured with a stable network connection using IPv4 addresses and interacts with other servers on the network. Security measures include SSL/TLS encrypted connections. Scope The scope of this vulnerability assessment relates to the current access controls of the system....

July 26, 2023 · 3 min · 442 words · Kazuhiro Funakoshi

Apply Filters to SQL Queries

Back to SQL Queries Project description This project is for investigating security issues to help keep the system secure. Based on findings that some potential security issues involve login attempts and employee machines. We use SQL filters to retrieve records from different datasets and investigate potential security issues. Retrieve after hours failed login attempts In order to list all after-hours failed logins, which are suspicious in this case, we performed a SQL query as follows....

July 18, 2023 · 2 min · 317 words · Kazuhiro Funakoshi

File Permissions in Linux

Project description This project repairs file permissions to its appropriate status. Check file and directory details After performing the command, ls -la in the /home/researcher2/projects/ directory, we found the following status. Describe the permissions string In the /home/researcher2/projects directory, there are five files with the following names and permissions: project_k.txt: -rw-rw-rw- User = read, write Group = read, write Other = read, write project_m.txt: -rw-r----- User = read, write Group = read Other = none project_r....

July 18, 2023 · 2 min · 321 words · Kazuhiro Funakoshi

Incident Report Analysis

Back to incident report Incident report analysis Instructions As you continue through this course, you may use this template to record your findings after completing an activity or to take notes on what you’ve learned about a specific tool or concept. You can also use this chart as a way to practice applying the NIST framework to different situations you encounter. Summary The organization recently experienced a DDoS attack, which compromised the internal network for two hours until it was resolved....

July 18, 2023 · 2 min · 315 words · Kazuhiro Funakoshi

Stakeholder Memorandum

Back to Security Audit Stakeholder memorandum TO: IT Manager, Stakeholders FROM: Kazuhiro Funakoshi DATE: 07/13/2023 SUBJECT: Internal IT Audit Findings and Recommendations Dear Colleagues, Please review the following information regarding the Botium Toys internal audit scope, goals, critical findings, summary and recommendations. Scope The following systems are in scope: accounting, endpoint detection, firewalls, intrusion detection system, security information and event management (SIEM) tool. Ensure current user permissions, controls, procedures, and protocols in place align with necessary compliance requirements....

July 17, 2023 · 2 min · 312 words · Kazuhiro Funakoshi