Network Vulnerability Assessment: A Case Study

706 Words 3 Pages
Vulnerability assessment as related to IT environment is any flaw or weakness in the network infrastructure’s defenses that could be exploited in order to create an impact on the network. When it comes to network architectures vulnerability is a security weakness and mostly it is not being seen as a security threat. Protecting and defending a network successfully requires an effective system architecture security. Plus organization, network engineers and administrators must have policies, guidelines and follow through with the vulnerability assessment process. A successful defense will require effective information security architecture with that vulnerability assessment.
With the constant advancement in knowledge, programs, and technology
…show more content…
A Vulnerability Assessment needs to be completed to identify weaknesses in the network security configuration in order to suggest changes. We must keep in mind that documentation on how the network systems are configured is critical for the recovery process during a penetrating testing. Vulnerability Assessments are designed to identify network weaknesses and help coming with security improvements and remedies.
Penetration testing is a testing method that tries to exploit a weakness in the system to prove that an attacker could successfully penetrate it. (Kim, D. & Solomon, Michael 2014, page 486). A vulnerability assessment is one of the steps for penetration testing. Without penetration testing, an organization will not know how vulnerable its network is, where its vulnerabilities lie within the network, and what types of damages these vulnerabilities could cause in the network.
With penetrating testing you have companies hire a third party to find ways to exploit or explore their companies own security weaknesses, defenses and vulnerabilities. After the penetrating testing the third party can turn around advice the companies on ways to increase their security, by preventing the finding weaknesses, and eliminates those threats and
…show more content…
Wireless: Attempt to gain access to the wireless servers and workstation and also gain unauthorized access.
Remote access: using generic password or user ID to gain unauthorized systems access.
Users’ education in conjunction with scenario-based training is the best defense against Social Engineering attacks. Organization must implement an education program with invigorate network and physical security measures to protect its systems. Also with the use of scenario-based training users of the network can learn how to properly answer or respond to social engineering threats or attacks. The after action analysis of such event will allow security administration and information assurance personnel revise and implement new training strategies and procedures as well as modify existing security

Related Documents