Cyber Security Analysis: System Quantification with NMAP - CYB535

Verified

Added on  2023/05/30

|4
|700
|376
Report
AI Summary
This assignment focuses on using the NMAP tool to quantify systems within a network, specifically a home network. It outlines the use of NMAP to identify the types and number of systems connected to the network, as well as determining who and what is on the network. The report details the commands used, such as 'nmap –sn' to perform a port scan and discover active hosts. The analysis reveals the number of IP addresses connected to the network and identifies the connected devices. The document also includes a network diagram justifying the network design, emphasizing regulatory compliance standards like HIPAA, PCI, and NIST for risk management and security. It highlights the importance of layered routing and VLANs for network segmentation and security.
Document Page
Running head: CYBER SECURITY
Cyber Security: Quantify the System
Name of the Student
Name of the University
Author’s Note
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1
CYBER SECURITY
Network Diagram
Justification of the network design
The above network diagram is created for a medium enterprise organization maintaining the
security of the organization. The regulatory compliance standards are needed to be followed for
developing the network governance of the risk associated with the management of the business needs.
The compliance standard should be equal with the security for eliminating the risk of unauthorized
access of the network. But none of the compliance standard are 100 percent secured the security is
dependent on the right selection of the compliance path. The difference between the different
compliance standards are needed to be identified for its selection in the development of the network
solution. The HIPAA compliance standard is used for the protection of the health information and it
should be ensured that the process security measures are followed appropriately (Kalaiprasath,
Elankavi & Udayakumar, 2017). The electronic transaction of the healthcare provides should be
protected that includes the data of the hospitals, individual health practitioners and the clinics. The
Document Page
2
CYBER SECURITY
health plans that includes the information of the flexible spending account, prescriptions, insurance,
etc, is also secured along with the third party business representatives data.
The network solution proposed for the organization is also compatible with the PCI standard
as the network is designed such that it is ensured that the credit or the debit card information is
process and stored using a secured card holder data environment. It should enforced for all the
business that stores, processes or transmits payment and the cardholders data. Since the organization
uses the third party processor it is important to implement the PCI standard in the network for
increasing the security of the network (Weinstein, 2016). The NIST standard can also be applied for
the development of the network framework such that the competitiveness and the innovation can be
promoted for maintaining competitiveness and encouraging the industry to maintain measurements of
the standards. The application of the NIST framework for the development of the network enhances
the economic security for the improvement of the living quality.
For the analysis of the security of the network framework different security test can be
applied in the network that helps in identification of the open ports and the current vulnerability of the
network and the servers for providing different service to the hosts connected in the network. The
current network solution sis developed for the management of the communication of the internal
device via a firewall and the servers that are used for communication with the outside network is
installed in the DMZ zone such that the user connected with the server cannot reach the internal
network and the resources are secured from external threats. Separate switch with different VLAN are
used for the different departments of the organization such that the network is subnetted into smaller
parts and the congestion and collision in the network is reduced. The network device and the servers
used for the configuration of the network is selected based on the compliance standard and
standardization such that it does not have an harmful effect on the health of the people working in the
workplace. Layered routing is used for management of the loads on then network and layer three
switch is used for configuring it as the server switch and manage the layer 2 switch as the client and
automatically get the VLAN information.
Document Page
3
CYBER SECURITY
References
Kalaiprasath, R., Elankavi, R., & Udayakumar, D. R. (2017). Cloud. Security and Compliance-A
Semantic Approach in End to End Security. International Journal Of Mechanical
Engineering And Technology (Ijmet), 8(5).
Weinstein, R. (2016). Cybersecurity: Getting beyond Technical Compliance Gaps. NYUJ Legis. &
Pub. Pol'y, 19, 913.
chevron_up_icon
1 out of 4
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]