logo

Report On Network Security - Unix Environment For Security Analysis

   

Added on  2019-09-30

10 Pages902 Words247 Views
COMPUTER & NETWORKSECURITY

AbstractNetwork security is of the utmost importance to any organization. Data is the most valuable entity and leaving it vulnerable can make the system weak and lose the critical information. When procuring a server, there are so many hardening steps that are taken into consideration so that when they are done, system can be made strong and robust. In this report, there are various vulnerabilities demonstrated which re breaching the security of the system. Mitigation of each vulnerability is also provided so that the risk does not persists.

In this report, we are using a Unix environment for security analysis,There are various vulnerabilities that can invite attacks if left untreated. Each of these vulnerability is tested and mitigated in the test VM built.a.Explanation of VulnerabilityAll the vulnerabilities shown in the section below are the loopholes that can invite various attacks and intrusions. They are well explained in each scenario with the respective mitigation. Vulnerability Scenario 1: FIREWALL RULESWhen the system is exposed to internet, it is vulnerable to various intrusions andattacks. When it was tested to ping google, it was pinging. The security features in Linux, that is IPTABLES was checked and in that it allowed all the traffic from anywhere to anywhere. This is a major security breach and needs an urgent attention.

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Computer & Network Security Analysis Report- Unix Environment
|10
|810
|122

Securing Linux Based OS: A Stepwise Guide to Harden Ubuntu 16.04 LTS Server
|20
|2197
|262

Advanced Network Security: Installation and Configuration Guide for CentOS, Apache, PHP, MySQL, and More
|28
|1536
|248

Pen Testing | Questions and Answers
|8
|619
|55

Firewall Rules for Network Security: Accessing, Mitigating Virus Attack, VPN Access, VLAN Access, Blocking RFC 1918
|10
|922
|63

Information and System Security Research Paper 2022
|4
|765
|7