Report On Network Security - Unix Environment For Security Analysis

Added on - 30 Sep 2019

  • 10


  • 902


  • 105


  • 0


Showing pages 1 to 3 of 10 pages
AbstractNetwork security is of the utmost importance to any organization. Data is themost valuable entity and leaving it vulnerable can make the system weak andlose the critical information. When procuring a server, there are so manyhardening steps that are taken into consideration so that when they are done,system can be made strong and robust. In this report, there are variousvulnerabilities demonstrated which re breaching the security of the system.Mitigation of each vulnerability is also provided so that the risk does notpersists.
In this report, we are using a Unix environment for security analysis,There are various vulnerabilities that can invite attacks if left untreated. Each ofthese vulnerability is tested and mitigated in the test VM built.a.Explanation of VulnerabilityAll the vulnerabilities shown in the section below are the loopholes that caninvite various attacks and intrusions. They are well explained in eachscenario with the respective mitigation.Vulnerability Scenario 1: FIREWALL RULESWhen the system is exposed to internet, it is vulnerable to various intrusions andattacks. When it was tested to ping google, it was pinging. The security featuresin Linux, that is IPTABLES was checked and in that it allowed all the trafficfrom anywhere to anywhere. This is a major security breach and needs anurgent attention.
You’re reading a preview

To View Complete Document

Become a Desklib Library Member.
Subscribe to our plans

Download This Document