CTEC5803 Vulnerability Investigation: Host & Network Security Analysis

Verified

Added on  2023/04/21

|1
|1619
|287
Practical Assignment
AI Summary
This assignment provides a detailed investigation into network security vulnerabilities, focusing on the methodologies and tools used to identify and mitigate potential threats. It emphasizes the importance of understanding business operations, locating sensitive data, and searching for hidden data sources to ensure comprehensive security. The analysis includes determining the physical and virtual servers in use, tracking existing security measures, and conducting vulnerability scans to confirm network security. The document references various security tools and techniques, including risk-based security, regular vulnerability scans, and the implementation of security policies, firewalls, VPNs, and encryption. It also highlights the importance of both internal and external vulnerability analysis, considering perspectives from both inside and outside the organization to proactively address potential security breaches. Desklib offers a platform to access this assignment and many more solved assignments and past papers for students.
Document Page
Investigating Network Security
(GH 5.53 Forensic Laboratory)
Introduction:
The network securities have been changing on the basis of business necessities, It is seen that different changes
done by various technical groups have been leading to vulnerability from the standpoint of cybersecurity. Hence, a
network security analysis is important to assure the health of the network. As the analysis is done, the business
gains secure, scalable and stable infrastructure of IT network (Yoo and Shon 2016).
Any consistent network vulnerability scanning is helpful for businesses to recognize security holes and weaknesses in
the network security prior the hackers plant any effective attack. Here, the reason to run the vulnerability scanner and
conduct the external vulnerability analysis is to see that the network devices open to various known vulnerabilities.
This is without actually compromising the systems (Kiekintveld, Lisý and Píbil 2015).
The vulnerability scan is effective in the beginning. However, the actual value originates from deploying the method to
address the recognize vulnerabilities. Risk-Based security conducts the analysis through the innovative scanning
technologies (Zhang et al. 2016). This is to ensure that every vulnerability that is pointed out is addressed with simple
and understandable recommendations of mitigating actions.
Conducting regular scans for vulnerabilities is the most suitable complement for performing various updates of
antivirus. This also includes important and needed security patches for critical vulnerabilities that are found out.
The ides of using dread troops, Cryptocurrency and messaging within the business framework has permitted the
members under every layer. These are isolated from other and unaware of the higher level of layers. Moreover, there is
no trace as the member of distribution member is captured while servicing the dead drop. It is helpful to make the
structure highly secured against infiltration, capture and takeover. Besides, they are been resilient inherently
(Schneier.com 2019).
Here, the scanning if quarterly vulnerabilities have been going long way to help the
organizations like GH 5.53 forensic lab. Here the data stored strictly remains among
them without any type of third party breaching, loss of data or malware. This
assessment process done by security experts of GH 5.53 forensic lab, over the network
is helpful to determine probable vulnerabilities that are exploited by attackers
(Knowles et al. 2015). Auditors of GH 5.53 forensic lab can use standard and proven
analysis methods, consulting and project management methods for delivering timely
and accurate outcomes for the laboratory. Having the network capabilities, GH 5.53
forensic lab can manage a prioritized list of variously identified vulnerabilities in the
network. This is helpful to understand the ways to fix them such that one can assure
one step ahead of their probable attackers. Here, some actionable recommendations for
assuring the total remediation.
Step 1: The ways in which the business is operated and organized
is to be understood and identified:
Here, most of the business has been dependable in collaboration
between a various representative from the units of internal
business, finance departments and legal teams. This is
coordinate with IT professionals about the proper network
necessities. Thus a business can consider issues like customer
and client privacy, business processes, competitive positioning
and regulatory compliances under the sector.
Step 2: Locating the applications and data used in business
processes:
It must be identified which of the data are sensitive and what
data has been at risk while the threat of privacy breach is
considered.
Step 3: Various hidden data sources are to be searched that is
allowing easy access for securing data:
It is particularly vital as there is cloud-based access for making
the information private or accessing around various platforms,
that includes tablets and smartphones.
Step 4: Determining the physical and virtual servers
that are run by applications needed for business
operations:
Here, the servers have not been protected and might
be allowed for accessing sensitive data instead of
knowing that.
Step 5: Tracking what security measures have been in
place:
The protection of network protection has been
including particular policies, virus detection, firewalls,
VPNs, disaster recovery and encryptions. This is vital
to know the abilities of present security,measures for
properly addressing the vulnerabilities.
Step 6: Scanning the network for vulnerability:
Here, the outcomes of the scan must provide
confirmation of network security. This must be helpful
to determine whether the vulnerable sector or virus is
determined. The business requires to create a network
security strategy. This can be done probably with the
help of the MSP.
While performing the external looking to vulnerability analysis of GH 5.53 forensic lab, they must attempt to compromise systems
from outside.
Hence, being external to the company is helpful to consider,
the publicly-routable IP addresses, systems on DMX, external interfaced of the firewall and many more (Hasrouny et al. 2017).
As one perform the inside looking around of the vulnerability analysis, one needs to take advantage as the internal and status id
elevated for trusting.
It is the perspective of the co-workers who have once logged into the systems.
The print services, file servers, databases and additional resources are also to be considered.
Moreover, there are striking features of these kinds of analysis. Hence, being
internal to the business provides elevated advantages more than any kind of
outsider.
For GH 5.53 forensic lab, security is configured to keep the intruders outside.
Here, very little is been done for securing the internals of the company
(Ahmad et al. 2015).
This includes departmental firewall, access the controls at user-level,
processes of authentication for internal resources and so on.
There are various resources while looking across the systems that are been
internal to them.
As one set themselves outside the company one is quickly provided with
untrusted status (Soomro, Shah and Ahmed 2016).
Here, the resources and systems available externally are highly restricted.
The security administrators are effective tools to be
used, including the knowledge that ate retained. The
various analysis tools available presently ate to be
considered, then they must be run against the
system and almost guarantee that there are various
false positives. This through user error or program
fault can give rise to the same error. This tolls might
find vulnerabilities that never existed or might seek
the vulnerabilities that have not existed (Al-Janabi et
al. 2017).
Depending on the resources and targets, the
presentation mentions that there are various
available tools. These can be for Windows system,
Linux system, wireless networks and many more.
Besides, another important part to undertake the
analysis also includes reviewing of physical security,
personal screening and many more. Latest ideas li
scanning the perimeter of the physical structure of
the enterprise for wireless network vulnerabilities is
an emerging idea. These can be investigated and
included into to the analysis. The exposure and
imagination are the limits of conducting and planning
those vulnerability analyses.
References:
Ahmad, I., Namal, S., Ylianttila, M. and Gurtov, A., 2015. Security in
software defined networks: A survey. IEEE Communications Surveys &
Tutorials, 17(4), pp.2317-2346.
Al-Janabi, S., Al-Shourbaji, I., Shojafar, M. and Shamshirband, S., 2017.
Survey of main challenges (security and privacy) in wireless body area
networks for healthcare applications. Egyptian Informatics Journal, 18(2),
pp.113-122.
Cvedetails.com., 2019. Security vulnerability search. [online] Available at:
https://www.cvedetails.com/vulnerability-search.php [Accessed 3 Feb.
2019].
Hasrouny, H., Samhat, A.E., Bassil, C. and Laouiti, A., 2017. VANet security
challenges and solutions: A survey. Vehicular Communications, 7, pp.7-20.
Kiekintveld, C., Lisý, V. and Píbil, R., 2015. Game-theoretic foundations for
the strategic use of honeypots in network security. In Cyber Warfare (pp.
81-101). Springer, Cham.
Knowles, W., Prince, D., Hutchison, D., Disso, J.F.P. and Jones, K., 2015. A
survey of cyber security management in industrial control systems.
International journal of critical infrastructure protection, 9, pp.52-80.
Schneier.com., 2019. Schneier on Security. [online] Available at:
https://www.schneier.com/ [Accessed 3 Feb. 2019].
Soomro, Z.A., Shah, M.H. and Ahmed, J., 2016. Information security
management needs more holistic approach: A literature review.
International Journal of Information Management, 36(2), pp.215-225.
Theregister.co.uk., 2019. Security News and Views for the World • The
Register. [online] Available at: https://www.theregister.co.uk/security/
[Accessed 3 Feb. 2019].
Yoo, H. and Shon, T., 2016. Challenges and research directions for
heterogeneous cyber–physical system based on IEC 61850: Vulnerabilities,
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
[object Object]