SlideShare a Scribd company logo
Presenter: Damaine Franklin
Information Security Management and Auditing
IT AUDIT – SHADOW IT SYSTEMS
July 1, 2017
1
What is Shadow IT 2
Shadow IT is a term that refers to Information Technology (IT) applications and
infrastructure that are managed and utilized without the knowledge of the
enterprise's IT department. Shadow IT can include:
 Hardware,
 Software web services
 Cloud applications
Executive Summary 3
This IT audit assess an organization for the
existence of any shadow IT systems. Area’s
accessed were:
 Network/Information Security Controls
 Unsanctioned Software’s and Applications
 Asset Identification and Classification
 Threats and Vulnerability Controls
IT Audit Scope
The purpose of this IT audit is to
perform a comprehensive risk
assessment of the organizations
IT/IS infrastructure with a focus on
any shadow IT systems with regards
to the organizations information
security policies
Network/Information Security Controls 4
Findings 1
 Company emails on personal smartphones
Risks
 Litigation (criminal/civil)
 Malicious Apps
 Lost or Stolen
 Email Phishing
 Man in the middle attack
Network/Information Security Controls
Cont’d
5
E-mail Fishing
Attacks
Fig. 2 sourced
Network/Information Security Controls 6
Fig. 3. Sourced: https://blogs.otago.ac.nz/infosec/files/2013/02/Slide4.png
Phishing Email Example
Network/Information Security Controls Cont’d 7
Recommendations
Since there are no polices that supports the use of work email on
personal smartphones, management should invest in corporate
owned close user group (CUG) for private encrypted
communication work related purposes.
Network/Information Security Controls 8
Findings 2
 Inappropriate use of Company Email
Risks
 It was discovered that some employees uses
their company email for public purposes
such: subscribing to ecommerce websites and
social media (Facebook). The inappropriate
uses of company email open the door for
email-based malwares and virus attacks.
Network/Information Security Controls 9
Recommendations
 If a suspicious email is opened
immediately, unplug your network cable
or shut down your computer, and
contact the IT Help Desk.
 Do not click on links (including the
unsubscribe links) in emails unless you
are confident they are legitimate.
 Enforce the policy on the uses of company
emails
 Limit social media uses
 Download and install security updates and
patches for all PC’s
 Ensure that antivirus software has the latest
definitions
 If an employee receives an email that doesn’t
look legit call the IT help desk
Network/Information Security Controls 10
Findings 3: Misuse of Confidential Password
Network/Information Security Controls 11
Risks
The purpose of a user password is to authenticate and allow access
to company intranet and information. In the case of non-repudiation,
shared passwords can allow an employee to contest or deny any
malicious use on their computer. For example, in emails non-
repudiation is used to guarantee that the recipient cannot deny
receiving a malicious email, which infects the computer with
ransomware.
Network/Information Security Controls 12
Recommendations
 Once an employee password has become compromised, the system
administrator should be notified to have it changed.
 Management should enforce the policies, which governs the proper uses
of passwords.
 Train employees on how to use complex passwords and how to secure it.
Rouge Devices on Company Network 13
Findings
 Rouge devices have been fund in the enterprise environment.
 Rogue refers to any device, access point, or client, whom with
unauthorized access attempts to connect, attack or interfere with
the originations network.
Rouge Devices on Company Network 14
Rouge 1. unmanaged switch
Rouge 2. wireless access point
Rouge 3. personal laptop
Rouge 4. LAN access point
Rouge Devices on Company Network 15
Risks
The fact that rouge devices are unmanaged means that the user has
full privileges to do just about anything. The main concern of rouge
device is the propagation of viruses on the corporate network.
Another concern is the infection of malware, which normally affect all
network devices or infiltrate an entire corporate network.
Rouge Devices on Company Network 16
Risks cont’d
Rouge device provide a vulnerable in the network where by an attacker
could hijack the device and use it to perform
 Peer Hijack
 Packet Spoofing
 Unauthorized access attack
 Reconnaissance
 Mac address table over flow
 Brute force attack
 Denial of service attack
Rouge Devices on Company Network 17
Recommendations
 Update security policies regarding
BYOD and the use of personal devices
on company private network
 Shutdown all unused switch ports
 Locate eradicate all rouge devices
 Configure strong encryption on
wireless access point
 Consider strong router/switch protocols
and standards to quickly neutralize and
control rouge devices.
 Separate normal user and privileged user
accounts
 Configure port security in each switch
Rouge Devices on Company Network 18
Mac address table over flow
Fig 10. source: http://player.slideplayer.com/12/3561082/data/images/img15.jpg
Rouge Devices on Company Network 19
Mac address table over flow
Fig 11. source: http://player.slideplayer.com/12/3561082/data/images/img16.jpg
Unsanctioned Software’s and Apps 20
Findings:
Although the IT policy outline strict guidelines regarding
intellectual property and licensing, some employees manage to
bypass the rules and participate in the use of rouge software’s and
applications. My audit reveals the following known unsanctioned
applications running on the organizations network.
Unsanctioned Software’s and Apps 21
Unsanctioned Sanctioned
Adobe Photoshop CS3 Adobe Photoshop CS6
Drop box
MS Outlook/network
shared drives
Spiceworks Inventory
Sage FAS 500 asset
inventory
Evernote Microsoft Outlook
Google Drive
MS Outlook/network
shared drives
Unsanctioned Sanctioned
AVG Internet Security
McAfee Enterprise
security
AutoCAD 2009
Autodesk Design
Suites 2016
StormCad
None
Tekla Structures
Autodesk Design
Suites 2016
Tekla Tedds
Tekla structured
Bluebeam Revu
Findings cont’d:
Unsanctioned Software’s and Apps 22
Risks: Use of file sharing solutions (Dropbox)
 Data stored in file sharing solutions become exposed to unauthorized users.
 File sharing services does not provide enterprise class security or control.
 Sensitive data stored in Dropbox is not secure and just as importantly, not
controlled by IT.
 Unsanctioned applications may have embedded malicious coding
 A breach of intellectual property rights may leady to legal ramifications
Unsanctioned Software’s and Apps 23
Recommendations
 Enforce polices regarding the usage of intellectual property and
licensing.
 Monitor FTP traffic on firewall
 Block FTP port
 Perform integrity check
Asset Identification and Classification 24
Findings
Asset Management Application
Fig 12. Sage FAS 500 Asset inventory
Asset Identification and Classification 25
Fig 13. Laptop
Fig 15. Multifunction
Fig 14. Asset tag barcode
reader
Asset Identification and Classification 26
Risk: Identification of Ghost Assets
A “ghost” asset is defined as a property that is lost, stolen,
or unusable, but is still listed as an active fixed asset in the
system
A crucial risk caused by ghost asset is that undocumented
devices may become unmanaged by the domain
controller. Once the domain recognizes a device as being
unknown, it becomes a rouge device, which is, then
recognize as security threat.
Asset Identification and Classification 27
Recommendations
 Eliminate ghost assets
 Conduct physical asset inventories
 Tag assets appropriately
 Use durable and lasting labels
 Perform frequent cyclical updates on
inventory logs
References 28
Corporation, N. (2015). Shadow IT in the Enterprise. Nasuni Corporation.
Microsoft. (2013). The Link Between Pirated Software and Cybersecurity Breaches. Microsoft Digital Crimes Unit.
Retrieved from http://www.play-it-safe.net/
Organisation. (2006). Information Technology - EDITION 3. Kingston, Jamaica: Government.
Points, R. A. (2017, June). Telelini. Retrieved from http://itsecurity.telelink.com:
http://itsecurity.telelink.com/rogue-access-points/
Ruggiero, P., & Foote, J. (2011). Cyber Threats to Mobile Phones. US-Cert. Retrieved from https://www.us-
cert.gov/sites/default/files/publications/cyber_threats-to_mobile_phones.pdf
Sage. (2011). Best Practices for Fixed Asset Managers. Herndon, VA: Sage Fixed Assets White Paper. Retrieved
from
http://www.sage.com/na/~/media/category/sna/assets/lp/sagebusinessknows/documents/resources/sage
_erp_best_practices.pdf
SolarWinds. (2017). Detecting and Preventing. SolarWinds. Retrieved from
http://web.swcdn.net/creative/pdf/Whitepapers/UDT_WP_Detect_Prevent_Rogue_Devices.pdf
Techopedia. (2017, June). Active Directory (AD). Retrieved from Techopedia:
https://www.techopedia.com/definition/25/active-directory
END
29

More Related Content

PDF
Cybersecurity roadmap : Global healthcare security architecture
PPTX
Enterprise Security Architecture Design
PPTX
IT Governance Framework
PPTX
The Path to IAM Maturity
PDF
Cybersecurity Roadmap Development for Executives
PDF
ISO 27005:2022 Overview 221028.pdf
PDF
NIST cybersecurity framework
Cybersecurity roadmap : Global healthcare security architecture
Enterprise Security Architecture Design
IT Governance Framework
The Path to IAM Maturity
Cybersecurity Roadmap Development for Executives
ISO 27005:2022 Overview 221028.pdf
NIST cybersecurity framework

What's hot (20)

PDF
ISO 27001:2022 What has changed.pdf
PPT
Introduction to it auditing
DOCX
Iso 27001 2013 Standard Requirements
PPTX
Dragos S4x20: How to Build an OT Security Operations Center
PPTX
ISO 27001 - information security user awareness training presentation - Part 1
PDF
IT Governance
PPTX
27001 awareness Training
PPTX
IT4IT - The Full Story for Digital Transformation - Part 1
PPTX
CISSP - Chapter 1 - Security Concepts
PPTX
Build an Information Security Strategy
PPTX
IT Audit For Non-IT Auditors
PDF
What is ISO 27001 ISMS
PPTX
Data Loss Prevention
PPTX
ISO 27001 - information security user awareness training presentation -part 2
PDF
Gartner's IT Score Wallchart
PPTX
Cyber Security roadmap.pptx
PPT
IT System & Security Audit
PPTX
MS. Cybersecurity Reference Architecture
PPTX
CRISC Course Preview
ISO 27001:2022 What has changed.pdf
Introduction to it auditing
Iso 27001 2013 Standard Requirements
Dragos S4x20: How to Build an OT Security Operations Center
ISO 27001 - information security user awareness training presentation - Part 1
IT Governance
27001 awareness Training
IT4IT - The Full Story for Digital Transformation - Part 1
CISSP - Chapter 1 - Security Concepts
Build an Information Security Strategy
IT Audit For Non-IT Auditors
What is ISO 27001 ISMS
Data Loss Prevention
ISO 27001 - information security user awareness training presentation -part 2
Gartner's IT Score Wallchart
Cyber Security roadmap.pptx
IT System & Security Audit
MS. Cybersecurity Reference Architecture
CRISC Course Preview
Ad

Similar to IT Audit - Shadow IT Systems (20)

PDF
Top Interview Questions Asked to a Penetration Tester.pdf
PDF
Top Interview Questions for Penetration Testers.pdf
PPT
IT-Security-20210426203847.ppt
PPT
IT-Security-20210426203847.ppt
PPT
IT-Security-20210426203847.ppt
PPT
IT-Security Assessment for IT assets.ppt
PPT
Security information for internet and security
PPTX
Can your company survive a modern day cyber attack?
PDF
Mis 1
PPT
MIS chap # 9.....
PDF
3.8 Ways to Establish Secure Protocols in a Digital Organization.pdf
PPT
IT-Security Awareness and Training session
PPT
Security Of Information Assets and why it matters.ppt
DOCX
Student NameCYB110Playbook Runbook Parts 1-3S.docx
PPTX
Network Security of Data Protection
PPTX
Top 25 SOC Analyst interview questions that You Should Know.pptx
PDF
Module 4 Cyber Security Vulnerabilities& Safe Guards
PPT
Security & ethical challenges
DOCX
Running Head RISK, THREAT AND VULNERABILITY MANAGEMENT .docx
Top Interview Questions Asked to a Penetration Tester.pdf
Top Interview Questions for Penetration Testers.pdf
IT-Security-20210426203847.ppt
IT-Security-20210426203847.ppt
IT-Security-20210426203847.ppt
IT-Security Assessment for IT assets.ppt
Security information for internet and security
Can your company survive a modern day cyber attack?
Mis 1
MIS chap # 9.....
3.8 Ways to Establish Secure Protocols in a Digital Organization.pdf
IT-Security Awareness and Training session
Security Of Information Assets and why it matters.ppt
Student NameCYB110Playbook Runbook Parts 1-3S.docx
Network Security of Data Protection
Top 25 SOC Analyst interview questions that You Should Know.pptx
Module 4 Cyber Security Vulnerabilities& Safe Guards
Security & ethical challenges
Running Head RISK, THREAT AND VULNERABILITY MANAGEMENT .docx
Ad

More from Dam Frank (20)

PDF
Is online education an effective replacement for traditional classroom teaching?
PDF
Lesson 7: The Seven Woes Against the Scribes and Pharisees
PDF
Lesson 6 : Jewish Sects at the Time of Christ
PDF
Lesson 5: Non Biblical Sources of Jesus Christ Historicity
PDF
Lesson 4 : Non Biblical Sources of Jesus Christ Historicity
PDF
Lesson 3: Non Biblical Sources of Christ Historicity
PDF
Lesson 2: Non Biblical Sources of Jesus Christ Historicity
PPTX
What is Sin?
PPTX
The Son of God - Part 6 Redemption
PPTX
The Son of God - Part 6 Substitution
PDF
The Son of God - Part 6 Propitiation
PDF
The Son of God - Part 5
PDF
The Son of God - Part 6
PPTX
The Son of God - Part 4
PPTX
The Son of God - Part 3
PDF
Jesus is God: Defending the Claim
PDF
Messianic Prophecies Quiz
PPTX
Messianic Prophecies
PPTX
The Progressive Revelation of the Name
PPTX
The Nature of God
Is online education an effective replacement for traditional classroom teaching?
Lesson 7: The Seven Woes Against the Scribes and Pharisees
Lesson 6 : Jewish Sects at the Time of Christ
Lesson 5: Non Biblical Sources of Jesus Christ Historicity
Lesson 4 : Non Biblical Sources of Jesus Christ Historicity
Lesson 3: Non Biblical Sources of Christ Historicity
Lesson 2: Non Biblical Sources of Jesus Christ Historicity
What is Sin?
The Son of God - Part 6 Redemption
The Son of God - Part 6 Substitution
The Son of God - Part 6 Propitiation
The Son of God - Part 5
The Son of God - Part 6
The Son of God - Part 4
The Son of God - Part 3
Jesus is God: Defending the Claim
Messianic Prophecies Quiz
Messianic Prophecies
The Progressive Revelation of the Name
The Nature of God

Recently uploaded (20)

PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PPTX
Cell Types and Its function , kingdom of life
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PPTX
Week 4 Term 3 Study Techniques revisited.pptx
PPTX
master seminar digital applications in india
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PDF
VCE English Exam - Section C Student Revision Booklet
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PDF
Business Ethics Teaching Materials for college
PPTX
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
PDF
Classroom Observation Tools for Teachers
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
Pre independence Education in Inndia.pdf
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PPTX
Cell Structure & Organelles in detailed.
PDF
Complications of Minimal Access Surgery at WLH
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Pharmacology of Heart Failure /Pharmacotherapy of CHF
102 student loan defaulters named and shamed – Is someone you know on the list?
Cell Types and Its function , kingdom of life
Supply Chain Operations Speaking Notes -ICLT Program
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
Week 4 Term 3 Study Techniques revisited.pptx
master seminar digital applications in india
2.FourierTransform-ShortQuestionswithAnswers.pdf
VCE English Exam - Section C Student Revision Booklet
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
Business Ethics Teaching Materials for college
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
Classroom Observation Tools for Teachers
Abdominal Access Techniques with Prof. Dr. R K Mishra
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Pre independence Education in Inndia.pdf
FourierSeries-QuestionsWithAnswers(Part-A).pdf
Cell Structure & Organelles in detailed.
Complications of Minimal Access Surgery at WLH

IT Audit - Shadow IT Systems

  • 1. Presenter: Damaine Franklin Information Security Management and Auditing IT AUDIT – SHADOW IT SYSTEMS July 1, 2017 1
  • 2. What is Shadow IT 2 Shadow IT is a term that refers to Information Technology (IT) applications and infrastructure that are managed and utilized without the knowledge of the enterprise's IT department. Shadow IT can include:  Hardware,  Software web services  Cloud applications
  • 3. Executive Summary 3 This IT audit assess an organization for the existence of any shadow IT systems. Area’s accessed were:  Network/Information Security Controls  Unsanctioned Software’s and Applications  Asset Identification and Classification  Threats and Vulnerability Controls IT Audit Scope The purpose of this IT audit is to perform a comprehensive risk assessment of the organizations IT/IS infrastructure with a focus on any shadow IT systems with regards to the organizations information security policies
  • 4. Network/Information Security Controls 4 Findings 1  Company emails on personal smartphones Risks  Litigation (criminal/civil)  Malicious Apps  Lost or Stolen  Email Phishing  Man in the middle attack
  • 6. Network/Information Security Controls 6 Fig. 3. Sourced: https://blogs.otago.ac.nz/infosec/files/2013/02/Slide4.png Phishing Email Example
  • 7. Network/Information Security Controls Cont’d 7 Recommendations Since there are no polices that supports the use of work email on personal smartphones, management should invest in corporate owned close user group (CUG) for private encrypted communication work related purposes.
  • 8. Network/Information Security Controls 8 Findings 2  Inappropriate use of Company Email Risks  It was discovered that some employees uses their company email for public purposes such: subscribing to ecommerce websites and social media (Facebook). The inappropriate uses of company email open the door for email-based malwares and virus attacks.
  • 9. Network/Information Security Controls 9 Recommendations  If a suspicious email is opened immediately, unplug your network cable or shut down your computer, and contact the IT Help Desk.  Do not click on links (including the unsubscribe links) in emails unless you are confident they are legitimate.  Enforce the policy on the uses of company emails  Limit social media uses  Download and install security updates and patches for all PC’s  Ensure that antivirus software has the latest definitions  If an employee receives an email that doesn’t look legit call the IT help desk
  • 10. Network/Information Security Controls 10 Findings 3: Misuse of Confidential Password
  • 11. Network/Information Security Controls 11 Risks The purpose of a user password is to authenticate and allow access to company intranet and information. In the case of non-repudiation, shared passwords can allow an employee to contest or deny any malicious use on their computer. For example, in emails non- repudiation is used to guarantee that the recipient cannot deny receiving a malicious email, which infects the computer with ransomware.
  • 12. Network/Information Security Controls 12 Recommendations  Once an employee password has become compromised, the system administrator should be notified to have it changed.  Management should enforce the policies, which governs the proper uses of passwords.  Train employees on how to use complex passwords and how to secure it.
  • 13. Rouge Devices on Company Network 13 Findings  Rouge devices have been fund in the enterprise environment.  Rogue refers to any device, access point, or client, whom with unauthorized access attempts to connect, attack or interfere with the originations network.
  • 14. Rouge Devices on Company Network 14 Rouge 1. unmanaged switch Rouge 2. wireless access point Rouge 3. personal laptop Rouge 4. LAN access point
  • 15. Rouge Devices on Company Network 15 Risks The fact that rouge devices are unmanaged means that the user has full privileges to do just about anything. The main concern of rouge device is the propagation of viruses on the corporate network. Another concern is the infection of malware, which normally affect all network devices or infiltrate an entire corporate network.
  • 16. Rouge Devices on Company Network 16 Risks cont’d Rouge device provide a vulnerable in the network where by an attacker could hijack the device and use it to perform  Peer Hijack  Packet Spoofing  Unauthorized access attack  Reconnaissance  Mac address table over flow  Brute force attack  Denial of service attack
  • 17. Rouge Devices on Company Network 17 Recommendations  Update security policies regarding BYOD and the use of personal devices on company private network  Shutdown all unused switch ports  Locate eradicate all rouge devices  Configure strong encryption on wireless access point  Consider strong router/switch protocols and standards to quickly neutralize and control rouge devices.  Separate normal user and privileged user accounts  Configure port security in each switch
  • 18. Rouge Devices on Company Network 18 Mac address table over flow Fig 10. source: http://player.slideplayer.com/12/3561082/data/images/img15.jpg
  • 19. Rouge Devices on Company Network 19 Mac address table over flow Fig 11. source: http://player.slideplayer.com/12/3561082/data/images/img16.jpg
  • 20. Unsanctioned Software’s and Apps 20 Findings: Although the IT policy outline strict guidelines regarding intellectual property and licensing, some employees manage to bypass the rules and participate in the use of rouge software’s and applications. My audit reveals the following known unsanctioned applications running on the organizations network.
  • 21. Unsanctioned Software’s and Apps 21 Unsanctioned Sanctioned Adobe Photoshop CS3 Adobe Photoshop CS6 Drop box MS Outlook/network shared drives Spiceworks Inventory Sage FAS 500 asset inventory Evernote Microsoft Outlook Google Drive MS Outlook/network shared drives Unsanctioned Sanctioned AVG Internet Security McAfee Enterprise security AutoCAD 2009 Autodesk Design Suites 2016 StormCad None Tekla Structures Autodesk Design Suites 2016 Tekla Tedds Tekla structured Bluebeam Revu Findings cont’d:
  • 22. Unsanctioned Software’s and Apps 22 Risks: Use of file sharing solutions (Dropbox)  Data stored in file sharing solutions become exposed to unauthorized users.  File sharing services does not provide enterprise class security or control.  Sensitive data stored in Dropbox is not secure and just as importantly, not controlled by IT.  Unsanctioned applications may have embedded malicious coding  A breach of intellectual property rights may leady to legal ramifications
  • 23. Unsanctioned Software’s and Apps 23 Recommendations  Enforce polices regarding the usage of intellectual property and licensing.  Monitor FTP traffic on firewall  Block FTP port  Perform integrity check
  • 24. Asset Identification and Classification 24 Findings Asset Management Application Fig 12. Sage FAS 500 Asset inventory
  • 25. Asset Identification and Classification 25 Fig 13. Laptop Fig 15. Multifunction Fig 14. Asset tag barcode reader
  • 26. Asset Identification and Classification 26 Risk: Identification of Ghost Assets A “ghost” asset is defined as a property that is lost, stolen, or unusable, but is still listed as an active fixed asset in the system A crucial risk caused by ghost asset is that undocumented devices may become unmanaged by the domain controller. Once the domain recognizes a device as being unknown, it becomes a rouge device, which is, then recognize as security threat.
  • 27. Asset Identification and Classification 27 Recommendations  Eliminate ghost assets  Conduct physical asset inventories  Tag assets appropriately  Use durable and lasting labels  Perform frequent cyclical updates on inventory logs
  • 28. References 28 Corporation, N. (2015). Shadow IT in the Enterprise. Nasuni Corporation. Microsoft. (2013). The Link Between Pirated Software and Cybersecurity Breaches. Microsoft Digital Crimes Unit. Retrieved from http://www.play-it-safe.net/ Organisation. (2006). Information Technology - EDITION 3. Kingston, Jamaica: Government. Points, R. A. (2017, June). Telelini. Retrieved from http://itsecurity.telelink.com: http://itsecurity.telelink.com/rogue-access-points/ Ruggiero, P., & Foote, J. (2011). Cyber Threats to Mobile Phones. US-Cert. Retrieved from https://www.us- cert.gov/sites/default/files/publications/cyber_threats-to_mobile_phones.pdf Sage. (2011). Best Practices for Fixed Asset Managers. Herndon, VA: Sage Fixed Assets White Paper. Retrieved from http://www.sage.com/na/~/media/category/sna/assets/lp/sagebusinessknows/documents/resources/sage _erp_best_practices.pdf SolarWinds. (2017). Detecting and Preventing. SolarWinds. Retrieved from http://web.swcdn.net/creative/pdf/Whitepapers/UDT_WP_Detect_Prevent_Rogue_Devices.pdf Techopedia. (2017, June). Active Directory (AD). Retrieved from Techopedia: https://www.techopedia.com/definition/25/active-directory

Editor's Notes

  • #14: , rogue refers to any device, access point, or client, whom with unauthorized access attempts to connect attack or interfere with the organsations network
  • #17: Explain each attack