Explore BrainMass
Share

Network security case study

This content was COPIED from BrainMass.com - View the original, and get the already-completed solution here!

In this case study, you are going to establish certain procedures that enable you and other network security specialists to evaluate a network from different possible threats and vulnerabilities. In this evaluation take into consideration different important points that should be looked at to decide how good the security of the network is. Give each security checklist some points or grade out of 100.Then calculate what percentage that your network got.

Write a report on network security and based on what holes that you find when you audit a network (like defence network) give recommendations to make the network more secure.
Make a summary of check list for security

© BrainMass Inc. brainmass.com March 21, 2019, 5:50 pm ad1c9bdddf
https://brainmass.com/computer-science/computer-system-implementation/network-security-case-study-234738

Attachments

Solution Preview

This should help you out! I actually have attached two separate papers to enable you to tailor your specific paper to your needs.

ABC Bank Security Plan
Information security is the process of protecting all data in an organization, more particularly the confidentiality, integrity, and availability of critical data in an organization. As stated in the Whitman text, "Risk is the likelihood of the occurrence of a vulnerability, multiplied by the value of the information asset, minus the percentage of risk mitigated by current controls, plus the uncertainty of current knowledge of the vulnerability (p 284)." We've assessed the risk of ABC Bank as it concerns to information security in this document and made recommendations based on these risks. ABC Bank & Trust Company has taken the first step to improving their information security posture by allowing this assessment of their organization. The Bank's current infrastructure would be considered above average compared to their peers, but there are some areas where they could improve. The bank currently uses the following model as it concerns to security management. This model is used in many quality management systems such and in the ISO standards that many manufacturing, environmental, and other industries use to control different aspects of their businesses.

(Teague, The Quality Toolbox)
The following findings were discovered during the technical assessment of the ABC Bank & Trust network and facilities.
High Priority:
Device: 10.9.0.9 (Internal Router)
Vulnerability: SNMP agent enabled with a well known community name
Recommendation: Disable SNMP on router or set string to private.

Device: 10.9.1.13 (Internal Reporting Server holds critical information)
Vulnerability: FTP server running with anonymous log on.
Recommendation: Disable service, or apply security to the ftp server to prevent unauthorized access.

Device: (10.1.2.0 through 10.2.2.255)
Vulnerability: Net meeting service running on several internal machines.
Recommendation: Disable service & look for a more secure solution.

Medium Priority:
Device: 10.1.2.99 (Internal Disclosure application)
Vulnerability: SQL 143 port is open
Recommendation: Disable SQL, or patch system and set up IPSEC for security access

Device: 10.1.2.98 (Internal Web server)
Vulnerability: IIS WebDav exists on servers
Recommendation: Disable if not being used.

Low Priority:

Device: (workstations 10.1.0.0 through ...

Solution Summary

The expert examines a network security case study. The percentage of the network is determined.

$2.19