logo

Identification of Security Issues in a Network

   

Added on  2023-01-13

12 Pages3102 Words67 Views
Running head: IDENTIFICATION OF SECURITY ISSUES IN A NETWORK
Identification of security issues in a network
Name of the Student
Name of the University
Author Note:

1IDENTIFICATION OF SECURITY ISSUES IN A NETWORK
Table of Contents
Introduction......................................................................................................................................2
Security Issues related to the only IoT device of the organization..................................................2
Security Issue 1: Conduction error..............................................................................................3
Security Issue 2: Inaccurate installation procedure.....................................................................3
Security Issues related to the IT infrastructure of the organization.................................................4
Security Issue 1: Lack of vulnerability detection system............................................................4
Security Issue 2: System vulnerabilities of the networking switch.............................................5
Example of real-world attack to support the above discussed security issues................................5
Description of an attack on IoT: Dyn attack................................................................................5
Description of an attack on IT infrastructure: Ukraine powerhouse...........................................6
Explanation of two vulnerabilities of selected organization with CVE..........................................7
Vulnerability 1: NETGEAR GS 116PP-100AJS.........................................................................7
Vulnerability 2: Linksys WRT 1900AC......................................................................................7
Proposed Countermeasure(s)/Solution(s)........................................................................................8
Conclusion.......................................................................................................................................9
Reference.......................................................................................................................................10

2IDENTIFICATION OF SECURITY ISSUES IN A NETWORK
Introduction
The notable determination of the paper is to present the security vulnerabilities associated
with a medium sized business organization. The report will be presented from the perspective of
an external cyber security consultant (Alrawais et al., 2017). This technical report will be
evaluating the security vulnerabilities of the IT infrastructure so that the security issues of the IT
infrastructure can be addressed.
Security Issues related to the only IoT device of the organization
The security issues associated with the use of the wireless temperature sensor are the
conduction error and the inaccurate installation procedure of the device. The conduction error
may lead to cyber security attacks such as DDoS and the inaccurate installation of the device
which is the other security issue of the temperature may lead to security issues like the worm-
hole attack. Poorly designed temperature sensors may result in temperature reading errors as
well. The poorly designed temperature sensor is very much vulnerable to the cyber security
attacks like DDoS and the Warm-hole attack.
Security Issue 1: Conduction error
The conduction error of the temperature sensors can lead to numerous security issues
such as the DDoS attack. Poor probe design of the temperature sensors may lead this security
attack. This security attack can have a huge negative impact on their networking activities in an
organization (Borgohain, Kumar & Sanyal, 2015). Jamming and tampering at the physical level
can be the most significant impact of these security attacks on the wireless temperature sensor of
this organization. Collision and exhaustion are the other sources of concern in the link layer,

3IDENTIFICATION OF SECURITY ISSUES IN A NETWORK
malicious flooding at the transport levels are the other security threats for this organization
regarding their utilization of the temperature sensors.
Security Issue 2: Inaccurate installation procedure
Inefficient installation of the temperature sensor which is used in this organization can
have a huge negative impact in terms of the security packets used in this organization. The
compromise of the data packets can lead to serious security threats such as the wormhole attack.
During this attack, the data packets of the medium-sized organizations are connected with the
data packets of other organization are compromised. The wormhole attack does not require any
compromising sensor; it makes it easier for cyber criminals to compromise the temperature
sensor which is readily used in this organization (Hajli & Lin, 2016). The temperature sensors
and the data associated with that device can be altered by the cyber criminals and at the same
time, other essential details of the system such as it location can be exposed by the cyber
criminals after the warm-hole attack.
Security Issues related to the IT infrastructure of the organization
There are few security issues which exists in this organization considering their IT
infrastructure such as the lack of vulnerability detection system can be very much responsible
for security attacks on the proxy servers used in this organization like the STP attack. The other
security issue of this organization is the system vulnerabilities of the networking switch of this
organization which can lead to security attacks such as the MAC flooding attack. The two
security issues which are related to the IT infrastructure of this organization are the security
attacks on the switches used by the network such as the STP attack and the MAC flooding.

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Network Security Vulnerabilities and Solutions
|11
|2382
|80

Network Analysis Report: Security Issues, Vulnerabilities, and Solutions
|14
|2059
|356

Security Issues in IoT and IT Infrastructure
|18
|4683
|229

CSG3308 : Wireless security
|11
|2460
|31

Security Issues In IoT
|12
|4945
|61

Second level Second level 7. Experimental Design First level Second level 5. Introduction First level Second level 5. References Harvad APA version 6 3
|3
|5435
|421