Wednesday, May 6, 2020

Vulnerability Assessment Of The Network Security - 1281 Words

Introduction According to Kizza (2013), the rapid growth of networking has led to increased security risks. Many of these risks are as result of hacking, improper uses of network resources and network device vulnerabilities. Awareness of the various weaknesses and vulnerabilities is vital to the success of current networks (Kizza, 2013). The network security incidents are increasing at a disturbing rate every year. As the complexity of these threats increases, so do the security measures required to protect networks. Enterprise data center operators and analysts, network administrators as well as other data center experts need to understand the principles of security in order to safely deploy and manage networks today. Vulnerability†¦show more content†¦Table 1 lists security weaknesses found and their description. Table 1 Network Security Weaknesses Vulnerability Description TCP/IP protocol vulnerabilities Some internet protocols such as HTTP, FTP, and ICMP are intrinsically insecure. On the other hand Simple Network Management Protocol (SNMP), Simple Mail Transfer Protocol (SMTP), and SYN floods are closely related to the intrinsic insecure structure design of TCP. The network workstations operating system weaknesses The company uses the Windows network operating systems whose security problem needs address. Network equipment weaknesses The various types of network equipment, such as routers, firewalls, and switches, have security weaknesses that should be recognized and protected against. These weaknesses include the following: Password protection Inadequate authentication Routing protocols Firewall holes Configuration Weaknesses Network administrators and engineers need to fully understand what the configuration vulnerabilities are and correctly configure their computing and network devices. Table 2 lists configuration vulnerabilitiesShow MoreRelatedThe Process Of Conducting Vulnerability Assessments And Modeling Threats1122 Words   |  5 Pages The purpose of this report is to explain the process of conducting vulnerability assessments and modeling threats. Vulnerability assessments are conducted to keep organizations safe from device and network vulnerabilities. There is a process that should be followed in order to perform a proper vulnerability assessment, if it is followed properly the organization will eliminate most if not all vulnerabilities from their network. Modeling threats is also an important step in creating a safe computingRead MoreInterpreting The Results And Remediation1512 Words   |  7 PagesInterpreting the results and remediation. After the vulnerability assessment has taken place i t is time to interpret the results of the scan. This is where the organization finds out what the vulnerabilities of their network are. The vulnerabilities that were found in the process of the assessment must be categorized, most vulnerability scanners will produce reports that will list and categorize the threats that were found, this is also called threat modeling which we will get into in the next sectionRead MoreLab 2 Performing A Vulnerability Assessment Worksheet Essay648 Words   |  3 PagesAssessment Worksheet Performing a Vulnerability Assessment CSS150-1502A-02 : Introduction to Computer Security Course Name and Number: _____________________________________________________ Johnathan McMullen Student Name: ________________________________________________________________ Stephen Osborne Instructor Name: ______________________________________________________________ Lab Due Date: ________________________________________________________________ Overview In this lab, you used Nmap commandsRead MoreIs4550 Week 5 Lab1611 Words   |  7 Pagesand Audit an Existing IT Security Policy Framework Definition Learning Objectives and Outcomes Upon completing this lab, students will be able to complete the following tasks: * Identify risks, threats, and vulnerabilities in the 7 domains of a typical IT infrastructure * Review existing IT security policies as part of a policy framework definition * Align IT security policies throughout the 7 domains of a typical IT infrastructure as part of a layered security strategy * IdentifyRead MoreRisk Assessment Is The Top Priority For Any Type Is Impenetrable1671 Words   |  7 PagesFindings Networks are very vulnerable to any holes that are within its infrastructure. In fact, many may believe that they have the best security measures in place, but no system or network of any type is impenetrable (Trim Lee, 2014). Risk assessments are extremely necessary so that corrective countermeasures can be applied and overall security can be enhanced (Broder Tucker, 2011). Security should ensure that this is the top priority for any company or organization. A detailed risk assessment showsRead MoreCase Analysis : Corporate Theft And Sabotage1483 Words   |  6 Pagesthreat (APT) Apart from these 2 major security threats, DBR should also be concerned about an Advanced persistent threat (APT). This is a network attack situation where a person infiltrates the network security of a company, gains unauthorized access and remains undetected for a long time. These attacks are generally aimed at stealing the data by gaining unauthorized continuing access to the network. Given the security threat from its competitors, APT network attack should seriously concern DBR managementRead MorePreliminary Security Assessment1466 Words   |  6 Pagesu04a1 Preliminary Security Assessment TS5311 Enterprise Security February 3, 2013 Introduction The number one responsibility of the Information Assurance/Network Security Officer(s) is to maintain the best security posture for the network that is possible. This task also means that the confidentiality, availability and integrity of the system are maintained. One of the first steps towards this isRead MoreA Report On Suntrust Bank1671 Words   |  7 Pagesorchestrated by the hacktivist group Izz ad-Din al-Qassam (Kitten, 2012). SunTrust plc. is committed to helping their customers to up their online transactions secure and safe. Despite the various security measures, features and procedures implemented by SunTrust to secure their network and server from cyber-attacks as well as to help protect consumers from scammers and unauthorized access to their accounts, yet, they become a victim of the hacktivist group Izz ad-Din al-Qassam who insistRead MoreEssay on Is 305 Week 3 Lab795 Words   |  4 Pages How to Identify Threats amp; Vulnerabilities in an IT Infrastructure Using ZeNmap GUI (Nmap) amp; Nessus Reports Learning Objectives and Outcomes Upon completing this lab, students will be able to: 1. Understand how risk from threats and software vulnerabilities impacts the seven domains of a typical IT infrastructure 2 Review a ZeNmap GUI (Nmap) network discovery and Nessus vulnerability assessment scan report (hardcopy or softcopy) 3. Identify hosts, operatingRead MoreThe Security Of A Home Network1352 Words   |  6 Pages Yu Lun Chou 1730799 MADS 6638 Computer Security Admin. George Thucydides 4/26/2016 Table of content Introduction Inventory Vulnerability Test Protection Support Incident Response Introduction Information play an essential role in everywhere. For a company, in order to run the company well, information management is a necessary skill, and leaking information, odds are , causes significant damage to the company. Even though a private network will not have as great damage as an organization

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.