Question

In: Computer Science

Management is pleased with the progress that has been made and likes the steps you have...

Management is pleased with the progress that has been made and likes the steps you have taken to set up a secured network environment. During the last status meeting, the following was asked: "Has everything been done that is possible to ensure the security of the environment?" Your response was that you believed it has, but one way to be sure is to conduct a vulnerability assessment and a penetration test.

  • Create a PowerPoint presentation of 6–8 slides that includes speaker notes and a references slide. It must cover the following:
    • Describe at least 2 common security threats against wired and wireless devices and typical countermeasures used by corporate security teams.
    • Describe at least 2 identity and access management tools needed to measure and monitor security risks across the enterprise.
    • Explain penetration testing and vulnerability assessments and how they differ.
    • Identify the benefits of using penetration testing and vulnerability assessments relative to threats.
    • Discuss the tools available in the industry (at least 5 different tools should be discussed), and explain how they can be used to mitigate security vulnerabilities.

The presentation must include a title slide, topics of discussion slides, main content slides, and reference slides. The references must use APA structure for organization of reference information. Font and font size are not required to meet APA format.

Solutions

Expert Solution

Here are some Security threats against wireless network :

1) Vulnerability Scanning and Password Cracking: it is one type of process, that hackers use certain tools such as Kismet and InSSider to scan network. After scanning the network, the hackers might proceed to get into the network.

2) Man In the Middle Attack (MITM): In this attack, position the attacker between two hosts in order to hijack connection and injecting traffic.

3) Rogue Access Points (RAP): The purpose of RAP is to hijack the connection of legitimate users is in order to sniff the activities or to steal confidential credentials of the users and later launch further attacks or simply to penetrate the Ethernet.

Some of the solutions for Minimizing Your Wireless Network’s Security Threats:

> Use strong Passwords.

> Encrypt your data with WPA3, which is currently the strongest encryption.

> Protect your SSID by renaming it, changing its default values, and disabling its broadcast to other users.

> Install a host-based firewall.

Here are some Security threats against wired network :

1) Firewall protection

2) BYOD Security threats

3) Employees error

Some of the solutions for improve wired network security:

> Implement VLANs to segregate traffic

> Use 802.1X for authentication

> Use antivirus

Identity and access management tools:

1) OneLogin

2) RSA SEcurID

3) SailPoint

The difference between a vulnerability test and penetration testing:

Vulnerability scan Provide a comprehensive baseline of what vulnerabilities exist and what changed since the last report.

penetration testing Concisely identify what data was compromised.

vulnerability test is ideal for lab environments.

penetration testing is ideal for physical environments and network architecture.

Benefits of using penetration testing and vulnerability assessments relative to threats.

​​​​​​Validates the effectiveness of current security safeguards

Protects the integrity of assets in case of existing malicious code hidden in any of them

Quantifies the risk to the internal systems and confidential information

Tools for mitigate security vulnerabilities.

1) Nmap (Network Mapper): It is open source network tool. By running Nmap, you can discover which ports are visible on a machine and the services running on them.

2) Nessus: The Nessus Project aimed to provide a remote security scanner that was free, powerful, up-to-date and easy to use.

3) Benchmark Tools: The free Benchmark and Scoring Tool from the Center for Internet Security (CIS) provides a quick and easy way to evaluate your systems and compare their level of security against the CIS minimum due care security Benchmark.

4) OpenSSH: SSH can encrypt passwords and network traffic between Web and database servers, thus preventing eavesdropping, IP spoofing, IP source routing, DNS spoofing and other network-level attacks.

5) Microsoft Baseline Security Analyzer & Windows Server Update Services: MBSA detects common security misconfigurations and missing security updates on Windows-based computer systems and Office applications

Happy to help. :)


Related Solutions

Question 1: Briefly summarize the progress that has been made with regards to Poverty, Sanitation, and...
Question 1: Briefly summarize the progress that has been made with regards to Poverty, Sanitation, and HIV incidence aspects of the 17 SDGs. Additionally, discuss the challenges faced in making progress with regards to these three issues, and policies in play to help mitigate or overcome these challenges.
what are the challenges in malawis health care system? what progress have been made for improvement?
what are the challenges in malawis health care system? what progress have been made for improvement?
During the past several decade's significant progress has been made in our understanding of the process...
During the past several decade's significant progress has been made in our understanding of the process of DNA replication in eukaryotes.  Although the basic mechanisms of replication are similar to prokaryotes, significant differences are also apparent.  In contrast to prokaryotes where a single DNA directed DNA polymerase (pol III) catalyzes the formation of both leading and lagging strands, two distinct DNA directed DNA polymerases catalyze leading and lagging strand syntheses in eukaryotes. The features of these two replicates are listed below. Pol...
The argument has been made that scientific management has been influential in criminal justice and that,...
The argument has been made that scientific management has been influential in criminal justice and that, as managers have become more advanced professionally, frontline criminal justice jobs have become more impoverished. How would you suggest that jobs, such as those in probation and parole, be designed to provide for enrichment opportunities while still utilizing risk-assessment instruments, electronic monitors, and other technological advances? Is the deprofessionalization syndrome an inevitable consequence of improvements in the technology of criminal justice?
It has been suggested that not all accounting choices are made by management in the best...
It has been suggested that not all accounting choices are made by management in the best interest of fair and consistent financial reporting. What are motivations can you think of for management's choice of accounting methods?
Explain the steps you would take after a client has disclosed that they are/ have been...
Explain the steps you would take after a client has disclosed that they are/ have been abuse?
You wish to determine whether consumers have made substantial progress in reducing their credit card debt?...
You wish to determine whether consumers have made substantial progress in reducing their credit card debt? Based on a sample of 1000 consumers in September 2001, and another sample of 1000 customers in September 2006, the average credit card debt 2711 in 2001 as compared to 2814 in 2006. The standard deviation of each sample was approximately 976. Using a level of significance of 0.1, a. What are the null and alternative hypothesis? (How do yo know) b. What is...
Problem: Jonathan and Beth plan on retiring in 15 years. They have made progress on their...
Problem: Jonathan and Beth plan on retiring in 15 years. They have made progress on their retirement portfolio (they currently have $100,000 in their 401ks + IRAs), but need to do more. Recognizing their lack of planning they have come to you for help in determining how much they need to save annually to produce an inflation-adjusted equivalent of $50,000 per year paid at the beginning of each your over 20 years of retirement. Moreover, they would like to leave...
Problem: Jonathan and Beth plan on retiring in 15 years. They have made progress on their...
Problem: Jonathan and Beth plan on retiring in 15 years. They have made progress on their retirement portfolio (they currently have $100,000 in their 401ks + IRAs), but need to do more. Recognizing their lack of planning they have come to you for help in determining how much they need to save annually to produce an inflation-adjusted equivalent of $50,000 per year paid at the beginning of each your over 20 years of retirement. Moreover, they would like to leave...
The world's poor countries have made as much progress in health and education in a generation...
The world's poor countries have made as much progress in health and education in a generation as the rich world did in a century. b. Analyze the policies a developing country could adopt in order to improve its world economic ranking.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT