Network Security Proposal
VerifiedAdded on 2023/04/06
|4
|861
|476
AI Summary
This document is a network security proposal for the University of Maryland University College. It covers topics such as vulnerability assessment, security policy, and risk management. The proposal suggests using tools like vulnerability scanners, ping scanners, and port scanners to identify and secure vulnerabilities. It also emphasizes the importance of a proper security policy and risk management in maintaining a secure network.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Network Security Proposal
Prepared for:
University of Maryland University College
Prepared by: Kevin Thorpe
Prepared for:
University of Maryland University College
Prepared by: Kevin Thorpe
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
A. Vulnerability Assessment
Requirements
Security systems create a sense of insurance from malicious attackers, vulnerabilities can cause
a security system from being labeled great to terrible. Network attackers are consistently
discovering methods to exploit the vulnerabilities to pursue strikes against companies,
individuals, etc. Vulnerabilities can be discovered also within devices such as user accounts,
passwords, network protocols, etc. Assessing vulnerabilities can be extremely helpful in
discovering crucial steps that authorize which route should be taken to eliminate the possibility
of attacks. Tools that could be helpful in reducing this would be port and ping scanners. Along
with those items network mappers are also helpful in discovering the vulnerabilities in the
devices through scanning and successfully getting approval of test.
Proposed Solution
Vulnerability assessment is the process of discovering the threat of any vulnerabilities in a
network or system. Contractors that specialize in networking can identify any vulnerabilities
providing an official assessment of the University of Maryland University College with
vulnerability scanner. With an network that has no protection and has no knowledge of the
holes that are in their network attackers can take advantage of this gaining access to
information that can be detrimental to students and faculty. Having a specialist monitor and
observe the network for any chances of vulnerabilities are essential.
With the access of an tool like a vulnerability scanner holes and cracks that lie within a system
can be discovered to provide an effective method to secure those vulnerabilities. This method
provides the ability to detect the lack of security with scanning unused ports, missing patches,
password issues, available ip addresses and misconfigurations. Along with that this tool with
regular updates are perfect for issues involving assessing vulnerabilities. When having a security
patch established scanners are utilized in ensuring that the threat of vulnerabilities are not
there. Some tools that can utilized to assist UMUC’s network for vulnerability assessment are
MBSA, Nessus and Retina Vulnerability Assessment.
Additional tools that would assist with this would be ping scanners, these are utilized by
sending ICMP echo request packets to various IP addresses. Port scanners are also useful for
probing systems and opening ports. Network mappers can be utilized with displaying devices in
a graphical setting being discovery devices. These mappers ping scanners to coincide with all
common ports. Password crackers provides abilities to perform cryptographic attacks on
passwords, with this it would identify weak passwords and would highly suggest stronger
passwords for users. The best system for UMUC would be the Open Vulnerability and
Assessment Language, it provides simple methods to test, analyze and report any signs of
vulnerabilities within a system.
Justification
Requirements
Security systems create a sense of insurance from malicious attackers, vulnerabilities can cause
a security system from being labeled great to terrible. Network attackers are consistently
discovering methods to exploit the vulnerabilities to pursue strikes against companies,
individuals, etc. Vulnerabilities can be discovered also within devices such as user accounts,
passwords, network protocols, etc. Assessing vulnerabilities can be extremely helpful in
discovering crucial steps that authorize which route should be taken to eliminate the possibility
of attacks. Tools that could be helpful in reducing this would be port and ping scanners. Along
with those items network mappers are also helpful in discovering the vulnerabilities in the
devices through scanning and successfully getting approval of test.
Proposed Solution
Vulnerability assessment is the process of discovering the threat of any vulnerabilities in a
network or system. Contractors that specialize in networking can identify any vulnerabilities
providing an official assessment of the University of Maryland University College with
vulnerability scanner. With an network that has no protection and has no knowledge of the
holes that are in their network attackers can take advantage of this gaining access to
information that can be detrimental to students and faculty. Having a specialist monitor and
observe the network for any chances of vulnerabilities are essential.
With the access of an tool like a vulnerability scanner holes and cracks that lie within a system
can be discovered to provide an effective method to secure those vulnerabilities. This method
provides the ability to detect the lack of security with scanning unused ports, missing patches,
password issues, available ip addresses and misconfigurations. Along with that this tool with
regular updates are perfect for issues involving assessing vulnerabilities. When having a security
patch established scanners are utilized in ensuring that the threat of vulnerabilities are not
there. Some tools that can utilized to assist UMUC’s network for vulnerability assessment are
MBSA, Nessus and Retina Vulnerability Assessment.
Additional tools that would assist with this would be ping scanners, these are utilized by
sending ICMP echo request packets to various IP addresses. Port scanners are also useful for
probing systems and opening ports. Network mappers can be utilized with displaying devices in
a graphical setting being discovery devices. These mappers ping scanners to coincide with all
common ports. Password crackers provides abilities to perform cryptographic attacks on
passwords, with this it would identify weak passwords and would highly suggest stronger
passwords for users. The best system for UMUC would be the Open Vulnerability and
Assessment Language, it provides simple methods to test, analyze and report any signs of
vulnerabilities within a system.
Justification
Ensuring that UMUC can maintain operations on a daily basis along with protecting it’s assets
are crucial, providing a system that can’t be breached. Every possibility of vulnerabilities would
be covered with high level tools. Utilizing these tools i.e. scanners and checkers UMUC will have
the ability to discover, protect and defend from kind of attacks or threats.
B. Security Policy
Requirements
A organization foundation is set through a proper security policy. With having this implemented
an organization should also consistently maintain and update it for keeping standards and
results high. Establishing a security policy ensures a company or organization that a proper
network can be established. Sections of a proper security policy should include Procedures,
Guidelines, Regulations and more. A security policy would also contain standards for software
security, hosts, user’s security, prevention of data and proper screening of individuals utilizing
the network. This should be established by security officials, with the organizations creating the
main structure.
Proposed Solution
Initiating the security should begin with the granted usage policy which indicates the direct
rights of usage to the company’s network. To grant movement of company resources and data
is completed with an Authorized Policy. Along with that two assets that are essential in
establishing a security policy are configuration management and also an code escrow
agreement. Modifying the control of employees and users are important factors of security.
Employee management also is standard for security policies they include agreement
documents, employee monitoring and training, termination procedures and potential employee
prescreening. The transferring of personal data will be done properly and secured to ensure
the data is not lost at any time. Two security terms that should also be included are code of
ethics and human resources. The policy should also included a resource allocation policy that
contains terms on staffing, technology, etc.
Justification
Establishing an great experience for the students and faculty where they feel comfortable but
in order for this to become reality a security plan is essential in doing so. Through a security
plan essential assets and valuable information will be covered from all aspects. Ensuring that
control is maintained at all times is done through implementing a security plan. Properly
implementing a security plan guarantees the proper measurements and steps that should be
taken in the properly monitoring threats, maintaining training for faculty and students
providing UMUC with a great network system ultimately that’s covered on all ends.
are crucial, providing a system that can’t be breached. Every possibility of vulnerabilities would
be covered with high level tools. Utilizing these tools i.e. scanners and checkers UMUC will have
the ability to discover, protect and defend from kind of attacks or threats.
B. Security Policy
Requirements
A organization foundation is set through a proper security policy. With having this implemented
an organization should also consistently maintain and update it for keeping standards and
results high. Establishing a security policy ensures a company or organization that a proper
network can be established. Sections of a proper security policy should include Procedures,
Guidelines, Regulations and more. A security policy would also contain standards for software
security, hosts, user’s security, prevention of data and proper screening of individuals utilizing
the network. This should be established by security officials, with the organizations creating the
main structure.
Proposed Solution
Initiating the security should begin with the granted usage policy which indicates the direct
rights of usage to the company’s network. To grant movement of company resources and data
is completed with an Authorized Policy. Along with that two assets that are essential in
establishing a security policy are configuration management and also an code escrow
agreement. Modifying the control of employees and users are important factors of security.
Employee management also is standard for security policies they include agreement
documents, employee monitoring and training, termination procedures and potential employee
prescreening. The transferring of personal data will be done properly and secured to ensure
the data is not lost at any time. Two security terms that should also be included are code of
ethics and human resources. The policy should also included a resource allocation policy that
contains terms on staffing, technology, etc.
Justification
Establishing an great experience for the students and faculty where they feel comfortable but
in order for this to become reality a security plan is essential in doing so. Through a security
plan essential assets and valuable information will be covered from all aspects. Ensuring that
control is maintained at all times is done through implementing a security plan. Properly
implementing a security plan guarantees the proper measurements and steps that should be
taken in the properly monitoring threats, maintaining training for faculty and students
providing UMUC with a great network system ultimately that’s covered on all ends.
C. Risk Management
Going through the proper phases of concluding
Going through the proper phases of concluding
1 out of 4
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.