Vulnerabilities in Network Security: An Analysis


Added on  2019-09-26

9 Pages1749 Words130 Views
Network Security AssessmentPart – 1Vulnerabilities Assessment
Vulnerabilities in Network Security: An Analysis_1

Introduction The purpose of this document is to provide an overview of the areas of network security and vulnerabilities of the network and the devices connected to the network.This process involves performing an in depth threat and risk assessment on all the different areas and network component to determine which of the areas are needed to be hardened for security. This will be done by using various tools and methods for the assessment. The final report will be including the areas which are needed to be hardened and what vulnerabilities are associated with that system and what steps and measures are needed to be applied in order to remove or mitigate such network security vulnerabilities.Information Collection TechniquesThe Network Security Assessment Team used the following information collection techniques and tools to gain and collect information and understanding of the network and server vulnerabilities: Information was collected through physical inventory:HardwareSoftwareData and information
Vulnerabilities in Network Security: An Analysis_2

The following automated discovery/collection tools were used on the servers to collect technical information:Network Mapper (NMAP)Nessus Vulnerability ScannerPersonal observationManual inspectionAccess control permissionsWireless LeakageIntrusion Detection testingFirewall testingIdentification of potential threats that could adversely impact systems or data’s Confidentiality, Integrity, and/or Availability (CIA).Identification of vulnerabilities discoveredEstimation of the likelihood that threats would/could exploit identified vulnerabilitiesAssess the impact to the systems and / or data’s CIA if a threat were to exploit a given vulnerability.Identification of ports and access open for non - authorized personalPerimeter security check for firewall rules.System checks for necessary protection software and unauthorized accessPolicy for data protectionTerminology and Clarifications
Vulnerabilities in Network Security: An Analysis_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Network Security Assessment

Network Security Assessment Report

Cyber Security: Vulnerabilities, Exploitation, and Security Controls

Network Requirements and Mitigation

Information System Security: Risk, Assets, Migrations and Vulnerabilities

Host and Application Security