Security Audit Report for Comtech Company: Network and Data Integrity

Verified

Added on  2023/04/21

|18
|2078
|261
Report
AI Summary
This report presents a security audit of Comtech Company, an IT-based company, assessing its hardware and software to identify security weaknesses. The report covers various aspects, including hardware and software security risks, such as web servers, DNS servers, routers, switches, and file system software, and recommends security measures like firewall configuration, anti-virus installation, and password policies. It also details the installation of Windows Server 2012 and the use of group policy settings to manage Windows XP clients, with references to various networking tools and security practices. The report emphasizes the importance of data sharing policies, disaster recovery plans, and policy compliance to ensure overall network and data integrity. The student's report provides a practical guide to implementing basic IT security within an organization and is available on Desklib.
Document Page
Running head: MANAGE NETWORK AND DATA INTERITY
ICTNWK403: MANAGE NETWORK AND DATA INTERGITY
(Student’s Name)
(Institutional Affiliation)
(Date)
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
MANAGE NETWORK AND DATA INTEGRITY 2
Executive summary
This audit report results to security audit of Comtech Company. The evaluation of
hardware and software has been conducted so as to identify weaknesses which can be misused
by attackers. The results of this security assessment audit report will lead to the implementation
of basic IT security within the organization.
Assessment 1: Project
Introduction
Comtech is an IT based company located in Melbourne. The company is involved in the
provision of professional IT services and support. The company has been operating since 2000
with various branches in Australia. The company has about twenty computers, two modems, and
two printers. As a system asset auditor, I will prepare an IT asset audit record for the company
which will comprise of a list of software and hardware.
Major security issues
The first line of defense for an organization is a firewall which has to be properly set with
separation between database servers and web servers known as DMZ network zone (Blanc &
Cotton, 2014).
List of hardware
Web-server
The security risk is very high considering the many web attacks. Some of the attacks
include SQL injections
Document Page
MANAGE NETWORK AND DATA INTEGRITY 3
DNS server
The security risk is very high as several IIS installation display very severe security
patches like MDAC RDS weaknesses, various ISAPI filters, and IIS/FrontPage extensions
vulnerabilities
Computers
The security risk is medium
Routers
The security risk is high due as routers sit in between a firewall and a switch.
Switches
The security risk is very low where logging is not implemented considering the limited switches
features.
SMTP server
The security risk is very high where malicious users or employees are able to send
unsolicited mail to 3rd parties using what is known as mail.Acme.com
SQL server
The security risk for this hardware is medium. An organization needs to remove all
employee users who are within the local admin group who don’t need to have the local admin
rights. One can also remove the built-in administrator group on the SL server (Odom, 2009).
List of software
File system software
The security risk is very high where the company is required not to allow world-writable
files particularly those owned by the root. One is also required to look for suspicious SGID and
Document Page
MANAGE NETWORK AND DATA INTEGRITY 4
SUID files. In addition, one is supposed to occasionally monitor the organization file system for
the various file types.
Windows operating system
The security risk is very high and one is supposed to always keep the Windows operating
system up to date on the latest security patches. In addition, an organization is required to
analyze the various file permissions and rights to make sure that the appropriate permissions are
applied (Kurose & Ross, 2016).
Anti-virus software
Kaspersky’s anti-virus software ought to be installed in both the windows server and all
the user computers. On the windows server, the anti-virus needs to be configured in such a way
that the server software is able to download the anti-virus definitions on a regular basis.
The recommended processes so as to prevent anti-virus problems
The organization need to run corporate standard
The company need to never open macros or any files attached to an email from untrusted,
suspicious or unknown sources
The company need to delete junk, spam, and chain email without forwarding, in with
Comtech Company
Always scan USB drives or any other external drive before opening it on both user
computers
The organization ought to periodically check lab anti-virus and the recommended
processes (CiscoNetworkingAcademy, 2014).
Network security policy
User account and password policies
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
MANAGE NETWORK AND DATA INTEGRITY 5
The security risk is very high. All the user account ought to be set-up using the domain
security policy. User password should have a combination of characters, numbers, and special
characters. In addition, the organization is supposed to lock-out unsuccessful logon attempts. All
those accounts which are set-up not to expire should be deleted; all the accounts ought to be set-
up in such a way that the passwords expire on a regular basis.
All the guests and administrator accounts ought to be renamed which makes more
problematic for an attacker to gain unlawful access into the organizational network. This should
be done also to the local administrator accounts and domain administrator.
When the similar password is being used for the various local administrator on the
various member servers, the user ought not to be prompted for passwords when accessing
another organization server when they have logged in using an administrator account. This
allows a user to access the organization network resources on multiple user computers by only
logging in once.
All computer screen savers ought to be configured so as to password protect the screen
after five minutes of inactivity. In case a user forgets to lock or to log off the terminal then this
ought to be done automatically within two minutes of inactivity.
General password policies
The system-level passwords like NT admin, the application administration accounts, and
the root ought to be changed on a quarterly basis
All the user-level passwords like web, desktop computer and email ought to be changed
after every three months
Document Page
MANAGE NETWORK AND DATA INTEGRITY 6
Password protection standards
Comtech employees need not reveal a password over the phone or sharing passwords
with anyone which includes administrative assistants. In addition, one need not format password
with family names.
Data sharing policy
Clients data is not to be shared with other clients or to any with any other individual
unless when stated. The company needs to have ethical review procedures between the
organization partners. In addition, the organization needs to have common contracting
procedures, but the company needs to treat every dataset and contract as unique. Before sharing
of data between various users one ought to identify potential risks which are related to data
sharing.
Disaster recover policy for the company
The organization ought to create have a contingency plan. Some of the plans the
company need to have computer emergency plan, data study plan, a succession plan, a critical
review of service lists, and a succession plan which describes a flow of responsibility when
normal company staff is unavailable. Also, these contingency plans need to explain the order of
long-term and short-term timeframes. The organization data should be backed on daily basis on
offsite storage.
Policy compliance
Document Page
MANAGE NETWORK AND DATA INTEGRITY 7
Comtech Company IT team need to verify the compliance of all the policies by the
employees. This will be done on periodic walk-thrus, internal and external audits. Employees
who will be found to have violated the company policies need to be subjected to a disciplinary
action.
List of the current standard tools for networking
Some of the current standard tools for networking include:
Wireshark network tool which is used as a network analyzer
iPerf tool, this is a tool which is used to ping two nodes
Nmap tool, this is a tool used as a network scanner (Blanc & Cotton, 2014)
Assessment 2: Observation
Windows server is widely used in most of the organizations. To install windows server,
one to have a minimum of 1.4 GHz processor, a minimum of 512 MB and disk space of 32 GB
(Shinder, et al., 2018). This section will take one through on how to manage system security in a
windows environment. Mainly this task will involve windows domain controller and a Windows
XP client.
Windows server 2012 installation
First is to install windows server 2012 DVD and wait for a period of time as the system all the
necessary files. This as shown by the below screenshots
Figure 1: After inserting DVD into the computer (Shinder, et al., 2018)
Figure 2: After pressing any key (Shinder, et al., 2018)
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
MANAGE NETWORK AND DATA INTEGRITY 8
Once the set-up has been loaded, the set-up the installation process as shown the screenshots
below
Figure 3: Windows server installation start (Shinder, et al., 2018)
Document Page
MANAGE NETWORK AND DATA INTEGRITY 9
Figure 4: Begin the installation process (Shinder, et al., 2018)
After full installation one then starts by setting up the passwords and administrator users as by
the screenshots below and then finalizing settings
Document Page
MANAGE NETWORK AND DATA INTEGRITY
10
Figure 5: Windows server 2012 settings (Shinder, et al., 2018)
Figure 6: Finalizing Windows Server 2012 settings (Shinder, et al., 2018)
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
MANAGE NETWORK AND DATA INTEGRITY
11
Group policy settings
After windows server installation one then proceeds to use group policy feature to
manage office XP editions and the windows clients. The very first step is to right click on the
organization unit and then clicking on create and link group policy so as to create a group policy
object. This is shown by the screenshot shown below
Figure 7: Creating Group policy (Krause, 2017)
Document Page
MANAGE NETWORK AND DATA INTEGRITY
12
The second step is to enter any of the group policy objects and when finished one then clicks ok
as shown by the screenshot shown below
Figure 8: Entering Group policy (Krause, 2017)
chevron_up_icon
1 out of 18
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]