logo

Computer & Network Security Analysis Report- Unix Environment

10 Pages810 Words122 Views
   

Added on  2019-09-30

Computer & Network Security Analysis Report- Unix Environment

   Added on 2019-09-30

ShareRelated Documents
COMPUTER & NETWORKSECURITY
Computer & Network Security Analysis Report- Unix Environment_1
AbstractNetwork security is of the utmost importance to any organization. Data is the most valuable entity and leaving it vulnerable can make the system weak and lose the critical information. When procuring a server, there are so many hardening steps that are taken into consideration so that when they are done, system can be made strong and robust. In this report, there are various vulnerabilities demonstrated which re breaching the security of the system. Mitigation of each vulnerability is also provided so that the risk does not persists.
Computer & Network Security Analysis Report- Unix Environment_2
In this report, we are using a Unix environment for security analysis,There are various vulnerabilities that can invite attacks if left untreated. Each of these vulnerability is tested and mitigated in the test VM built.a.Explanation of VulnerabilityAll the vulnerabilities shown in the section below are the loopholes that can invite various attacks and intrusions. They are well explained in each scenario with the respective mitigation. Vulnerability Scenario 1: FIREWALL RULESWhen the system is exposed to internet, it is vulnerable to various intrusions andattacks. When it was tested to ping google, it was pinging. The security features in Linux, that is IPTABLES was checked and in that it allowed all the traffic from anywhere to anywhere. This is a major security breach and needs an urgent attention.
Computer & Network Security Analysis Report- Unix Environment_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Report On Network Security - Unix Environment For Security Analysis
|10
|902
|247

Advanced Network Security: Installation and Configuration Guide for CentOS, Apache, PHP, MySQL, and More
|28
|1536
|248

Securing Linux Based OS: A Stepwise Guide to Harden Ubuntu 16.04 LTS Server
|20
|2197
|262

Network Security Assessment: Part 1 - Vulnerabilities Assessment
|9
|1577
|381

Network Security Assessment: Part 1 - Vulnerabilities Assessment
|9
|1749
|483

Network Security & Its Vulnerabilities | Document
|9
|1749
|130