Explore BrainMass

Explore BrainMass

    Network security case study

    This content was COPIED from BrainMass.com - View the original, and get the already-completed solution here!

    In this case study, you are going to establish certain procedures that enable you and other network security specialists to evaluate a network from different possible threats and vulnerabilities. In this evaluation take into consideration different important points that should be looked at to decide how good the security of the network is. Give each security checklist some points or grade out of 100.Then calculate what percentage that your network got.

    Write a report on network security and based on what holes that you find when you audit a network (like defence network) give recommendations to make the network more secure.
    Make a summary of check list for security

    © BrainMass Inc. brainmass.com June 3, 2020, 10:30 pm ad1c9bdddf


    Solution Preview

    This should help you out! I actually have attached two separate papers to enable you to tailor your specific paper to your needs.

    ABC Bank Security Plan
    Information security is the process of protecting all data in an organization, more particularly the confidentiality, integrity, and availability of critical data in an organization. As stated in the Whitman text, "Risk is the likelihood of the occurrence of a vulnerability, multiplied by the value of the information asset, minus the percentage of risk mitigated by current controls, plus the uncertainty of current knowledge of the vulnerability (p 284)." We've assessed the risk of ABC Bank as it concerns to information security in this document and made recommendations based on these risks. ABC Bank & Trust Company has taken the first step to improving their information security posture by allowing this assessment of their organization. The Bank's current infrastructure would be considered above average compared to their peers, but there are some areas where they could improve. The bank currently uses the following model as it concerns to security management. This model is used in many quality management systems such and in the ISO standards that many manufacturing, environmental, and other industries use to control different aspects of their businesses.

    (Teague, The Quality Toolbox)
    The following findings were discovered during the technical assessment of the ABC Bank & Trust network and facilities.
    High Priority:
    Device: (Internal Router)
    Vulnerability: SNMP agent enabled with a well known community name
    Recommendation: Disable SNMP on router or set string to private.

    Device: (Internal Reporting Server holds critical information)
    Vulnerability: FTP server running with anonymous log on.
    Recommendation: Disable service, or apply security to the ftp server to prevent unauthorized access.

    Device: ( through
    Vulnerability: Net meeting service running on several internal machines.
    Recommendation: Disable service & look for a more secure solution.

    Medium Priority:
    Device: (Internal Disclosure application)
    Vulnerability: SQL 143 port is open
    Recommendation: Disable SQL, or patch system and set up IPSEC for security access

    Device: (Internal Web server)
    Vulnerability: IIS WebDav exists on servers
    Recommendation: Disable if not being used.

    Low Priority:

    Device: (workstations through ...

    Solution Summary

    The expert examines a network security case study. The percentage of the network is determined.