180 likes | 206 Views
Take control against cyber terrorism with Cyber Security Evaluation Tool (CSET) - a comprehensive assessment and recommendation system. Identify vulnerabilities, rank concerns, and fortify your network's defenses with CSET.
E N D
Chris D Hicks Director of IT MCSE, MCP + Internet Security MCP: 2175419 Since 2000
Cyber Security Evaluation ToolDHS (CSET) Cyber terrorism is a real and growing threat. Standards and guides have been developed, vetted, and widely accepted to assist with protection from cyber attacks. The Cyber Security Evaluation Tool (CSET) includes a selectable array of these standards for a tailored assessment of cyber vulnerabilities. Once the standards are selected and the resulting question sets answered, the CSET creates a compliance summary, compiled variance statistics, ranked top areas of concern, and generated security recommendations. April 09, 2014
Basic Steps to Start • Identify Equipment & Connectionscomputers, servers, firewall and routers, wireless devices and printers, • Determine Vulnerabilitiesfirewall ports, email server, vpn and remote access software; Team Viewer and LogMeIn, wireless access points, usb and portable devices, wireless printers, boss’s mobile access • Scan & Inventory Your NetworkSolar Winds, Belarc Advisor, Wire Shark, JDSU Network Analyzer • Categorize & Prioritize Groupsaccounting system, server room, wireless access, mobile devices, public wifi
Document Network Assets • Microsoft Visio with Excel
Chris D Hicks Director of IT MCSE, MCP + Internet Security MCP: 2175419 Since 2000