Network Vulnerability Assessment: A Case Study

Improved Essays
Vulnerability assessment as related to IT environment is any flaw or weakness in the network infrastructure’s defenses that could be exploited in order to create an impact on the network. When it comes to network architectures vulnerability is a security weakness and mostly it is not being seen as a security threat. Protecting and defending a network successfully requires an effective system architecture security. Plus organization, network engineers and administrators must have policies, guidelines and follow through with the vulnerability assessment process. A successful defense will require effective information security architecture with that vulnerability assessment.
With the constant advancement in knowledge, programs, and technology
…show more content…
A Vulnerability Assessment needs to be completed to identify weaknesses in the network security configuration in order to suggest changes. We must keep in mind that documentation on how the network systems are configured is critical for the recovery process during a penetrating testing. Vulnerability Assessments are designed to identify network weaknesses and help coming with security improvements and remedies.
Penetration testing is a testing method that tries to exploit a weakness in the system to prove that an attacker could successfully penetrate it. (Kim, D. & Solomon, Michael 2014, page 486). A vulnerability assessment is one of the steps for penetration testing. Without penetration testing, an organization will not know how vulnerable its network is, where its vulnerabilities lie within the network, and what types of damages these vulnerabilities could cause in the network.
With penetrating testing you have companies hire a third party to find ways to exploit or explore their companies own security weaknesses, defenses and vulnerabilities. After the penetrating testing the third party can turn around advice the companies on ways to increase their security, by preventing the finding weaknesses, and eliminates those threats and
…show more content…
Wireless: Attempt to gain access to the wireless servers and workstation and also gain unauthorized access.
Remote access: using generic password or user ID to gain unauthorized systems access.
Users’ education in conjunction with scenario-based training is the best defense against Social Engineering attacks. Organization must implement an education program with invigorate network and physical security measures to protect its systems. Also with the use of scenario-based training users of the network can learn how to properly answer or respond to social engineering threats or attacks. The after action analysis of such event will allow security administration and information assurance personnel revise and implement new training strategies and procedures as well as modify existing security

Related Documents

  • Great Essays

    Data Communication and Net-Centric Computing (COSC 2061) Assignment 2 Student Name: Weibin Zhong Number: s3503887 Introduction This report is identifying what are FDMA, TDMA and CDMA and how to maintain the communication seamlessly and the roaming service as well as the cost of roaming service. Furthermore, the 1G, 2G, 3G and 4G generations will be discussed.…

    • 1458 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    To combat these concerns, the team focused on four different controls. Insider Attack: The setting on the firewalls was set to maximum. The setting allowed the network reject, block, or deny potentially malicious payloads that would allow access. Authentication, RBAC, IDPS, and firewalls were used in conjunction to reduce insider threat opportunities. Additionally, these systems notified network administrators of any foreign presence within the boundary.…

    • 1194 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Pt1420 Unit 1 Study Guide

    • 607 Words
    • 3 Pages

    Testing is one of the most important parts of software development life cycle. It is an element of software quality assurance and can be described as a process of running a program in such a manner as to uncover any errors. Testing also demonstrates that software functions appear to be working according to specifications, that behavioral and performance requirements appear to have been met. That test will be carried out when the system is complete. In this chapter, I test my simulation software with testing method.…

    • 607 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    A company can determine if they have a good strategy by testing it. The first test(s) that comes to mind is from the article “Have you tested your strategy lately?” It is stated in the article that few companies can even pass four of the ten tests. The ten tests help a firm to determine the strength of their current strategy. The first test is important as it helps for a company to determine if their strategy will really stand up and challenge other companies in the market.…

    • 477 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    John Parachini Case Study

    • 790 Words
    • 4 Pages

    This paper will also relate the threat of this type of attack with the risk management perspectives…

    • 790 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    Identify strategies to control and monitor each event to mitigate risk and minimize exposure Identify at least two types of security events and baseline anomalies that might indicate suspicious activity. One type of a security event that might indicate supicious activity is an authentication failures found in audit logs. Audit logs contain a high volume of events so particular attention on which events that should be specifically tracked and managed require consideration. An audit log can identify patterns of activity that can signal a security a potential breach. Whether the attack was successfull or not the audit information should be stored in a central respository for future forensic refernce if ever needed.…

    • 1084 Words
    • 5 Pages
    Superior Essays
  • Decent Essays

    First, it is important to understand that through the application of some of the NIST security control mechanisms, the threat in the case can be substantially minimized. Some of the main approaches and methods that may be used towards minimizing the threat described include enhanced security awareness and training of the users of the system, access control into the system under consideration, frequent system maintenance and upgrades, occasional audits into the system, protection of the system from non-secured program codes, application of intrusion detection systems to detect any form of intrusions into the system and the protection of the system from spywares and spam. 14.5 The first and perhaps the most important value of the threat is that…

    • 252 Words
    • 2 Pages
    Decent Essays
  • Brilliant Essays

    (2006, February). Special Publication 800-18 REV 1: Guide For Developing Security Plans For Information Technology Systems. Retrieved October 30, 2015 from http://csrc.nist.gov/publications/nistpubs/800-18-Rev1/sp800-18-Rev1-final.pdf NIST - National Institute of Standards and Technology. (2012, September). Special Publication 800-30 REV 1: Guide for Conducting Risk Assessments.…

    • 1450 Words
    • 6 Pages
    Brilliant Essays
  • Great Essays

    1. Purpose After several security incidents Greiblock Credit Union (GCU) Board of Directors needs a sound policy to address the situation. The main objective of this document is to improve the security culture of the organization. The specifications of this policy will address dynamic vulnerability analysis, intrusion detection, and incident response.…

    • 1879 Words
    • 8 Pages
    Great Essays
  • Improved Essays

    The best way to evaluate a denial of service (DoS) incident is to base it on the incident analysis that was previously done. From the analysis we had gathered valuable information and this is my evaluation. After getting complaints that the network was running slow I immediately started to do an incident analysis to find out what was happening (Tipton & Frause 2007). So, I decided to use the National Institute of Standards and Technology methodology to seek the answers.…

    • 337 Words
    • 2 Pages
    Improved Essays
  • Great Essays

    Annotated Bibliography

    • 1797 Words
    • 8 Pages

    As seen with the case in which someone has to put a password to an Email account, confidentiality is a matter that is of great concern in many scenes of life . Cybersecurity is quite applicable as a tool that offers security when it comes to transfer of data though networks and between different people in one connection. For instance, cybersecurity is a tool used to ensure that the information shared among workers within an institution, through a connection of computers and computer systems, is not accessed by people who do not belong to this organization. In many cases, people will try to enter forcefully and access such confidential information without the consent of the organization. Cybersecurity helps such organizations in installing systems where access will be denied to non-members, and allowed to members since they make use of passwords and other security mechanisms installed within the computers and the connections .…

    • 1797 Words
    • 8 Pages
    Great Essays
  • Decent Essays

    Vulnerabilities and threats to Critical Infrastructures and other related risks have been recognized for a long time. Since 1997, critical infrastructure has been a great concern. “Critical Infrastructure is classified as a National Concern because of its scope and its importance to the nation.” () There seem to be fourteen areas of infrastructures that require protection from threats. These areas are Transportation, Food, Water, Public Safety, Government, Emergency services, Finance and much more, these infrastructures are essential to the economy because they provide goods and services to the economy and national defense.…

    • 113 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    The NIST publication 800-42 describes penetration and security testing. 10. According to the NIST document, what are the four phases of penetration testing? a. The four phases of a penetration test are Planning, Discovery, Attack, and Reporting.…

    • 802 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    What revisions in the testing approach would need to be made to do…

    • 2548 Words
    • 11 Pages
    Great Essays
  • Improved Essays

    Mercure luxury hotel is a hotel brand, which uses a marketing plan. A marketing plan refers to an outline used to guide the marketing process of an organization in order to help it achieve its marketing objectives (McDonald & Keegan, 2002). However, information gathered through SWOT, PESTLE, and TOWS analysis revealed deficiencies in various areas. Market Analysis SWOT analysis: This is a framework used for summarizing a situation and position of a company (Rao et al. 2008).…

    • 710 Words
    • 3 Pages
    Improved Essays