From the course: Performing a Technical Security Audit and Assessment
Unlock the full course today
Join today to access over 22,600 courses taught by industry experts or purchase this course individually.
Solution: Pick the right reviews
From the course: Performing a Technical Security Audit and Assessment
Solution: Pick the right reviews
(upbeat music) - [Instructor] You've been asked to find out how exposed your organization is to data loss due to human error on a set of database systems. Now you need to pick the right review techniques for this scenario. Before I tell you the reviews I would pick, here are some security controls I'd be looking for. Does your organization require and enforce least privilege? The fewer people who have access to the database servers, the less chance there is for accidental data loss. Who is authorized to access the databases and database servers? If you don't know who should access the data, you can't enforce restrictions on those who shouldn't. And how frequently are the databases being backed up? Are backups adequate in the event of data loss? So I'm going to pick the review techniques that help answer these questions. Let's step through the different reviews and see which ones make the most sense to use. Documentation…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
Required skillsets2m 52s
-
(Locked)
Conduct documentation reviews2m 8s
-
(Locked)
Conduct log reviews3m 4s
-
(Locked)
Conduct ruleset reviews2m 57s
-
(Locked)
Conduct system configuration reviews3m 35s
-
(Locked)
Conduct network sniffing1m 43s
-
(Locked)
Network sniffing tool demo: Wireshark3m 21s
-
(Locked)
Conduct file integrity checking4m 55s
-
(Locked)
File integrity checking tool demo1m 18s
-
(Locked)
Challenge: Pick the right reviews1m 6s
-
(Locked)
Solution: Pick the right reviews3m 9s
-
-
-
-
-
-
-