M04 - Monitor and Administrator System and Net Sec
M04 - Monitor and Administrator System and Net Sec
M04 - Monitor and Administrator System and Net Sec
Level-III
Based on November 2023, Curriculum Version - II
August, 2023
Addis Ababa, Ethiopia
Acronym.................................................................................................................................v
1. User Accounts..................................................................................................................8
Self-check test-1................................................................................................................15
Self-check test-2....................................................................................................................35
3. Authentication Requirements........................................................................................40
Self-check test-3................................................................................................................46
Self-check test-4................................................................................................................56
Developers Profile................................................................................................................57
User Account Provisioning: Implement a formal process for user account provisioning. This
process should include verifying the user's identity, determining the appropriate level of access
based on their role and responsibilities, and creating user accounts with strong passwords or
passphrase.
User Account Reviews: Conduct regular reviews of user accounts to ensure they are still required
and have appropriate access privileges. This includes reviewing user roles, access levels, and
permissions. Remove or modify access for users who no longer require it.
By implementing these and some others control measures, you can effectively manage user
accounts and reduce the risk of unauthorized access, data breaches, and insider threats. Regularly
review and update your account management processes to adapt to changing security
requirements and industry best practices.
Operating System Configuration: Review and modify default settings on the operating system
(OS) level. This includes disabling unnecessary services, closing unused ports, and enabling
security features such as firewalls. This is practically performed on operation sheet 1.1
User Permissions: Adjust default user permissions to follow the principle of least privilege.
Limit the abilities of users to install software, modify system settings, or access sensitive files
Ministry of Labor and Monitoring and Administering System Version 1
Page 8 to 57
Skills and Network Security November, 2023
Author/Copyright Level III
unless necessary for their work. Regular user accounts should not have administrative privileges
by default.
Network Device Settings: Modify default settings on network devices such as routers, switches,
and firewalls. Change default passwords and usernames, disable unnecessary services or ports,
and apply security patches and firmware updates regularly.
Web Browser Configurations: Adjust default settings in web browsers to enhance security.
Enable pop-up blockers, disable or restrict plugins and extensions, and configure privacy and
security settings to provide the appropriate level of protection.
Regularly review and update the modified settings as new security threats emerge or as your
organization's security requirements evolve. Stay informed about security best practices and
consult relevant security guidelines and recommendations provided by software vendors and
security organizations.
Identify the target audience: Determine which user groups or individuals should see the legal
notice. It may be applicable to all users or specific groups based on their roles or access
privileges.
Test and deploy: After configuring the legal notice, test it in a controlled environment to ensure
it is displayed correctly and is readable. Once validated, deploy the changes to the production
environment.
Regularly review and update: Periodically review the content of the legal notice to ensure it
remains accurate and relevant. Update it as necessary to reflect any changes in policies,
regulations, or legal requirements.
It's important to note that while legal notices can help communicate important information, they
should not replace user awareness and training programs. Users should receive proper education
and understanding of the policies and agreements mentioned in the legal notice.
1. Use Passphrases
Create long and memorable passphrases.
Remember that while strong passwords are essential, they are just one part of a comprehensive
security strategy. Regularly review and update security policies to adapt to evolving threats.
Additionally, consider implementing other security measures such as account lockout policies
and monitoring for unusual login activity.
Third-Party Services:
Vendor Policies: If using third-party services that involve user authentication, review
and ensure alignment with their password security practices.
Vulnerability Assessments:
Regularly conduct vulnerability assessments using tools that scan systems and networks
for known vulnerabilities.
Prioritize and address high-risk vulnerabilities promptly.
Continuous Monitoring:
Implement continuous monitoring solutions to respond to security events in real time.
Use intrusion detection systems and security information and event management (SIEM).
Self-check test-1
Instruction: You are required to perform the following questions individually.
I. Write true if the questions are correct and write false if the questions are incorrect.
1. Password policies enforce users that require to create complex passwords or passphrases.
2. A user account defines the actions a user can perform in Windows.
3. Never store passwords in plain text; use secure methods like hashing with salt.
4. Password managers often include features to generate and assess password strength.
II. Choose the best answer from the questions listed below.
1. User Account Provisioning process should include______________
A. Verify user's identity C. Level of access
B. Role and responsibilities D. All
2. Account monitoring checking user account activities for any signs of _________
A. Unauthorized access C. Unusual login patterns or
B. Multiple failed login attempts D. All
3. Operating system configuration modifying default settings on the operating system level,
this include_______________
A. Unnecessary services C. Closing unused ports
B. Enabling security features D. All
4. ___________have a well-defined event reaction plan in place in case of a security
incident related to compromise passwords.
A. Incident Response Plan C. Third-Party Services
B. Alternate Authentication D. Password Change Policies
III. Matching the following from column “A” into column “B“
A B
1. Multi-Factor Authentication A. Use Passphrases
2. Hashing and Encryption B. Prevent brute-force attacks.
3. Account Lockout Policies C. For storing and transmitting passwords.
4. References for Password Strength D. Implement for sensitive data.
IV. List and Fill in the blank space for the following questions.
1. List the password creation guidelines
2. List the authentication policies for reviewing password procedures
Ministry of Labor and Monitoring and Administering System Version 1
Page 15 to 57
Skills and Network Security November, 2023
Author/Copyright Level III
3. What are the recommendations for Improving Password Strength?
4. List some of the steps security gaps within your system and network security?
2. Click the Enabled column at the top to sort your rules by status until the value of Yes
is at the top. Make a note of the preconfigured rules.
Note: The rules created by Liquid Web allow access to your server. Disabling or
editing these rules could cause network disruptions or prevent support from assisting
you.
Task 3: Open a Port in Windows Server Firewall
1. Open the firewall manager again.
2. Click Inbound Rules from the left pane to reveal the Inbound Rules pane on the
right.
Ministry of Labor and Monitoring and Administering System Version 1
Page 19 to 57
Skills and Network Security November, 2023
Author/Copyright Level III
3. Click New Rule in the right-hand pane to open the New Inbound Rule Wizard.
4. In the New Inbound Rule Wizard, under the Rule Type section, select the Port radio
button and click next.
5. In the Protocol and Ports section, select TCP or UDP. Next, select the radio button for
all local ports or Specific local ports. For this tutorial, choose Specific local ports and
enter the corresponding port number. If listing multiple ports, split them with a
comma. Once completed, click next.
6. In the Action section, select Allow the connection (or choose the setting for your
requirements) and click Next.
8. Finally, give your new rule a descriptive name so that it is easy to find later, and click
Finish.
You should now be able to see your new rule created in the Inbound Rules pane and establish
connections to your server with the configured port if a program or service is listening on that
port.
Ministry of Labor and Monitoring and Administering System Version 1
Page 21 to 57
Skills and Network Security November, 2023
Author/Copyright Level III
Task 4: Close a Port in Windows Server Firewall
If you need to close a previously opened port, find and disable the rule that opens the port
using these steps.
1. Open the firewall manager.
2. Click Inbound Rules from the left pane to reveal the Inbound Rules pane on the
right.
3. Click the Enabled column at the top to sort your rules by status until the value of Yes
is at the top.
4. Locate the rule for the local port you would like to close.
5. Right-click on the rule and select Disable.
2.2. View and Configure Inbound Rules in the Console of windows server
Security Center/Settings:
Some operating systems have centralized security dashboards.
App Permissions:
Control what permissions applications have.
Security Policies:
Set and enforce security policies for the system.
Remember that while built-in security features are valuable, they should be complemented with
additional security measures, such as regular patching, security awareness training, and the use
of third-party security tools, to establish a robust security posture.
Password Management:
Ministry of Labor and Monitoring and Administering System Version 1
Page 30 to 57
Skills and Network Security November, 2023
Author/Copyright Level III
Creation of Strong Passwords: Users are responsible for creating strong, unique
passwords that are not easily guessable.
Regular Password Updates: Adhering to policies that require periodic password
changes enhances security.
Phishing Awareness:
Device Security:
Securing Personal Devices: If allowed for work-related tasks, users should follow
security practices on personal devices, including regular updates and antivirus software.
Reporting Lost or Stolen Devices: Users play a vital role in reporting lost or stolen
devices promptly to initiate security measures.
Software Updates:
Promptly Applying Updates: Users should apply software updates promptly to ensure
that systems are protected against known vulnerabilities.
Reporting Software Issues: Prompt reporting of software-related issues helps in
addressing security concerns efficiently.
Physical Security:
Securing Workstations: Users play a role in physically securing their workstations to
prevent unauthorized access.
Ministry of Labor and Monitoring and Administering System Version 1
Page 31 to 57
Skills and Network Security November, 2023
Author/Copyright Level III
Locking Devices When Away: Adhering to the practice of locking computers when
away from the desk contributes to physical security.
Data Backups:
Adherence to Backup Policies: Users should follow organizational backup policies,
ensuring that critical data is regularly backed up.
Understanding Data Recovery Procedures: Users should be aware of data recovery
procedures in case of data loss.
In summary, users are integral to the success of any cybersecurity strategy. Their awareness,
proactive involvement, and adherence to security practices contribute significantly to
maintaining a secure environment. Continuous education, clear communication, and a
collaborative approach between users and IT/security teams are essential for a robust security
posture.
Coordinate with IT Changes: Integrate virus checking into your organization's change
management process.
Test Updates: Ensure that antivirus updates are tested before deployment. Ensure that
antivirus updates are tested before deployment.
Selecting authentication and authorization processes is a crucial aspect of designing a secure and
effective access control system. Authentication verifies the identity of users, systems, or
applications, while authorization determines the permissions and access levels granted to
authenticated entities. Here are considerations and steps to guide the selection of authentication
and authorization processes: