Gf Risk Assessment Paper

4309 Words9 Pages

Running Header: GFI: Risk Assessment UNCLASSIFIED 1 GFI: Risk Assessment UNCLASSIFED 19 GFI: Risk Assessment SGTs Cranston, Patterson, Zagurski NCOA SSG Fekete Contents 1. Background and Purpose 2. Network Inventory, Value, and Priority 3. Perimeter Security: Access Vectors, Vulnerabilities, and Solutions 4. Remote Access Vulnerabilities and Solutions 5. Authentication and Data Protection for Mobile Devices 6. Wireless Security, Vulnerabilities, and Mitigations 7. Evaluate the Authentication Protocols in the Networks a. Wired b. Wireless c. Mobility 8. Web System Protocols and Vulnerabilities 9. Web Access 10. Cloud Computing 11. Final Thoughts Background and Purpose Global Finance, Inc. …show more content…

Two routers demark the border between internet and intranet. Internal to these routers are two more routers, creating the appearance of a demilitarized zone (DMZ). However, there are access points, the wireless antenna system and the remote access server (RAS), that provide deeper intranet access that do not rely on the DMZ, rendering the latter rather decorative than substantial. Lastly, there is the virtual private network (VPN) that makes use of the edge routers and provides greater intranet access. Over all, there are four access points: VPN, two edge routers, the RAS, and the wireless system. The RAS, VPN, and wireless provide internal access. The wireless antenna array is vulnerable to masquerade (with credentials taken from and evil-twin attack or dumpster dive). Combining a MAC address or IP spoofing attack to work around any whitelist efforts would gain access to the internal network. The router that services the VPN likely just forwards all traffic as port and IPs to filter on would be inapplicable. This, for all intent, puts the VPN on the edge making it …show more content…

This allows us to establish the wireless network with a simple WPA2 password for employee access. We also recommend establishing a guest wireless network with limited capability to browse the internet that doesn?t require a password for authentication. Another benefit of an online portal is that users can work from home or from satellite offices as needed. For the sake of redundancy, it may be prudent to keep the Virtual Private Network (VPN) connection to our satellite office; however, it would not be necessary. It would also be wise to remove the RAS and PBX from the company network. These legacy systems allow remote dial-up users to authenticate to the network, but their functionality could be accomplished through a web browser under the new system. Though it may be initially costly to implement, the increased functionality and ease of access to a browser-based portal system should provide exceptional returns on investment. This scalable selection will also improve the security of the network and proprietary

Open Document