Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
Network Security Final Exam
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Recommended: Network Security Final Exam
Network Security Assessment
Prepared for:
University of Maryland University College
Prepared by:
Christopher Harris
Executive Summary
Security of the companies data is one of the most important components which allows the business to perform its day to day operation using various networking devices, services that absolutely needs to be protected from intruders. Some of these devices include online transactions, the exchange of data between users and clients both internal and external and external web data needs to be secured. There are several polices that would need to be configured such as a web sever and firewall configurations. However, with these configurations the first and most important task is to identify any vulnerabilities or loopholes in security within the company. The company has both LAN (Local Area Network) and WAN (Wireless Local Area Network) and a web sever. These resources need to be secured at all times from hackers or anyone else by implementing the appropriate security measures.
I. Vulnerability Assessments
Security measures need to be implanted in order to secure the various resources. One of these vulnerabilities is the web server itself. If certain FTP ports are left
…show more content…
open hackers may gain access to them. Hackers could use different attacks such as DoS attacks. This vulnerability is crucial and must be monitored since most likely employee information will be stored on it. If accessed it could lead to a huge amount of data loss. Another vulnerable area is the wireless network. This is because attackers from the outside can access it, whether they are in the parking lot or inside the building. The network has a password and an SSID. These passwords can be decrypted using a password cracking software that is easily available. One such way is a Brute Force attack. Getting access to the internal network can result in a heavy amount of damage being done. The firewall is yet another vulnerability, if someone were to attack the firewall and sniff or deposit malicious packets into the network; packets could be redirected to a different location than they were originally intended to. The last vulnerability is information on the web and mail servers or even the company website. An attacker could use Social Engineering, Trojans or Session hacking. Social engineering is where an attacker gathers information about a user from a social site such as Facebook or MySpace and sends mail to that user, usually asking them to click on a link. The users session then has just transferred all of that information to the attacker. The firewall must be protected at all costs, if it is not the company will not survive. Another area of weakness that could cause damage if not fixed as all of the resources that lies on the website or web server and even the Mail server. In order for the business to effectively run, there should some switches and modems that can be used for a wireless infrastructure. To implement this, a switch is required along with LAN cables in case there are any requirements for connecting the system in a LAN. There should also be a NAC (Network Access Protocol) that allows the switch, modem and firewall to work together to provide security features. II. Network/System Security Recommendations One of the most important things to do is to make sure that the Windows server is configured to provide maximum security to the business.
There are several ways that this can be completed. It is vital that all communication both internal and external be encrypted using strong encryption algorithms. The protocols that are used to send user credential or store session information cannot be used within any window services. This could lead to session hijacking and attackers could access any information stored. Periodic maintenance of the servers should be performed for any software updates or patches as soon as possible. Otherwise you run the risk of a successful attack. There are security protocols installed to protect website data such as SSL and
TLS. The wireless network also needs to be made secure from intruders. One way is to implement OTP or Single Sign on techniques. OTP can be used so that the company can send the one time password to a customer to use and after that job or transaction is complete they can no longer sign on. Again the passwords should be complex so that they are difficult to crack. They should include special characters and numeric values. There are two commonly used wireless protocols; WPA and WEP, one of these protocols should be used so that sensitive data can be transferred over the wireless network All incoming and outgoing traffic must flow through the firewall. It is essential that the firewall be hardened and configured well. One was to configure it well is to encrypt the HTTP services. There are also certain protocols that can be disabled or limited such as SNMP, SSH, FTP, net flow and RADIUS. When a request is made to access a resource, make sure to confirm by using their identity and a password. If a user is not doing anything for an extended amount of time a session timeout feature should be implemented. III. Application/End-User Security Recommendations There are applications that are located within the organization that its employees use. Every employee should have training on these applications so that they know how to secure the systems from unauthorized access. There are also configurations that can be done in the users systems such as updating the software and firewalls making sure that all patches are up to date. There should also be complex passwords enforced to make sure that simple, easy to access passwords cannot be used. Any default setting or unused ports should also be disabled. To add additional levels of security to the wireless network, the strongest authentication and encryption techniques should be used with a strong configuration to the firewall and DMZ servers. The company should also include anti-virus software and a backup that performs routine checks of the system to determine if any viruses have made it into the network. A SLA (Service Level Agreement) between the company and the ISP covering all of the services they use. Bibliography
A scan of Aim Higher College’s primary Web server using a Nikto shows a large number of default configuration files and sample files on many of the older servers. It seems from the scenario that there are possible vulnerabilities or exploits that are present in the files and if loaded and accessed it will cause some harm or damage to the machine and or network. Countermeasures to protect against this scenario would be the implementation of a secured network where it would be tough to access the files. Have a WPA2 wireless network in place so there is no sufficient way to manipulate the files. Also, implement patch management and keep up to date of anti-malware and anti-spyware updates. This helps in the summarization of the possible threats the College can face in certain scenarios and explains in how to protect against them.
4. Server hardening – Request copies for your hosting company’s server hardening steps. This will detail the process of how they apply their measures for security to your servers.
Authentication Header (AH) and Encapsulating Security Payload (ESP) are a part of the IPSec components, they are network layer protocols allowing secured communications through a VPN tunnel. Within a firewall to enable communication for AH one will use protocol 50 and for ESP protocol 51 (Frankel, Hoffman, Orebaugh & Park, 2008), both protocols 50 and 51 can be enable within the same end-to-end IPSec connection which is the Tunnel Mode connected by two gateways. Nonetheless, for Transport Mode, there are some restrictions in the order in which they appear. While AH supports connectionless integrity and authentication of the packets, ESP provides data origin authentication and confidentiality through the use of encryption, both AH and ESP provide
Maintain accurate inventory of control System Devices and check the exposure of this devices to External Networks:
Sites can never be 100 percent safe if they are connected to the Internet. The ideal system is up to date on patches, has a firewall, is monitored, has all unneeded services disabled, and has up to date antivirus software installed. The ideal site also has an incident response capability and knowledgeable staff. Unfortunately the Internet is a highly interdependent world. There is no silver bullet to stop DoS attacks or vaccine to prevent them, but increasing awareness is the first step to successfully combating the problem.
There are several ways to protect your information from the outside world; you just need the ammunition to do it. Because this has become a focal point for computer and Internet user’s, many companies are capitalizing on a growing industry and producing software packages to prevent privacy intrudion. A couple of ways that you can protect your self are URL encryption, OS shielding, JavaScript filtering, and cookie control. All of these are effective ways of protecting your self. But take caution, these are not guaranteed to complete block out intruders and completely protect you and your information. They are merely preventive steps you can take.
We are one of the largest trauma centers in the metropolitan area and are looking to fill our Security Operations Supervisor position. We have over 80 security officers split between three 8-hour shifts. Our medical center has been in business for over 50 years.
Network Security is the protection of the computer’s network though out the entire infrastructure. It can protect very important information and computer files to help prevent theft, spyware, malware, viruses, and more. Depending on if you have a public or private network, can determine what type of security settings you need for your network. All people are different on what they want to have secured or not, but most people do not know how to prevent people or things from getting in their network. “You must have a general understanding of security terminology and specifications as it relates to configuring hardware and software systems.”(Roberts, Richard M. 599). That quote states that by knowing and understanding security terms and specifics, you can
Watch Guard Fireware has a firewall based IPS the can detect and block of attacks in the proxy policies. When enabling Firebox, this will protect the network from any kind of attack especially zero day threats from the outside world. Also, the IT staff should use a signature-based Intrusion prevention system to that is good for maintaining efficiency and performance protection on the network. Using my suggestions will prevent any more threats in the future for these web servers on the college’s
When it comes to protecting an infrastructure, careful planning and coordination needs to take place. Protecting an infrastructure takes an important security initiative called Critical Infrastructure Protection (CIP). The United States critical infrastructure is protected by the Department of Homeland Security.
The security topology will determine what network devices are employed at what points in a network. At a minimum, the corporate connection to the Internet should pass through a firewall. This firewall should block all network traffic except that specifically authorized by the security policy. Blocking communications on a port is simple; just tell the firewall to close the port. The issue comes in deciding what services are needed and by whom, and thu...
5. Look at the bottom, under IP Options. Put a check in the box “Refuse Multiple Connections from the same IP”. This will prevent one person from blocking your FTP to others.
An attacker looks for poorly configured network devices to exploit. Common vulnerabilities include weak default installation settings, wide open access controls and unpatched devices. To gather information from the encrypted network traffic attacker places the packet sniffing tool on the network. Sniffing is the act of monitoring network traffic for data such as clear-texts passwords or other configuration credentials. Usually transmitted information carried along during an Secure SHELL session cannot be seen but other information such as sender’s and receiver’s IP addresses, DNS requests to resolve hostname, port numbers and the amount of data is visible. If the traffic along the network is encrypted by the attacker, the attacker can see which sites are visited, amount of data received and sent and the port numbers used for the connection. Using a simple packet sniffer, all plaintext traffic can be read easily. This becomes possible because of weak physical security or lack of encryption during the process of sendin...
Once the new application architecture is implemented, employees will be required to run an internet browser (preferably IE6) with a minimum of 128-bit encryption. User will then browse to a secured URL through their web browser to establish a secure connection with the corporate VPN. This will require that each location's firewall be configured to pass all secured traffic over port 443. Once a secured connection is established, users will be prompted to login with either their username or clock number and their chosen password.
The agreement between the company and I was to advice the company management toward adopting the best network management plan and security plan. Through the study, I carried out in the firm I was required to evaluate the firm requirement in term of network planning and making sure that the firm has proper mechanism to secure its systems against malicious damage. Considering that, the management personnel have background in IT therefore; they required me to give an expert opinion on the best ways in which they can adopt the network management and the security plan. They required me to evaluate firm needs and what the IT world would offer the firm to enable them to lay down plans for the network and security in the firm.