Purchase Solution

Network security case study

Not what you're looking for?

Ask Custom Question

In this case study, you are going to establish certain procedures that enable you and other network security specialists to evaluate a network from different possible threats and vulnerabilities. In this evaluation take into consideration different important points that should be looked at to decide how good the security of the network is. Give each security checklist some points or grade out of 100.Then calculate what percentage that your network got.

Write a report on network security and based on what holes that you find when you audit a network (like defence network) give recommendations to make the network more secure.
Make a summary of check list for security

Purchase this Solution

Solution Summary

The expert examines a network security case study. The percentage of the network is determined.

Solution Preview

This should help you out! I actually have attached two separate papers to enable you to tailor your specific paper to your needs.

ABC Bank Security Plan
Information security is the process of protecting all data in an organization, more particularly the confidentiality, integrity, and availability of critical data in an organization. As stated in the Whitman text, "Risk is the likelihood of the occurrence of a vulnerability, multiplied by the value of the information asset, minus the percentage of risk mitigated by current controls, plus the uncertainty of current knowledge of the vulnerability (p 284)." We've assessed the risk of ABC Bank as it concerns to information security in this document and made recommendations based on these risks. ABC Bank & Trust Company has taken the first step to improving their information security posture by allowing this assessment of their organization. The Bank's current infrastructure would be considered above average compared to their peers, but there are some areas where they could improve. The bank currently uses the following model as it concerns to security management. This model is used in many quality management systems such and in the ISO standards that many manufacturing, environmental, and other industries use to control different aspects of their businesses.

(Teague, The Quality Toolbox)
The following findings were discovered during the technical assessment of the ABC Bank & Trust network and facilities.
High Priority:
Device: 10.9.0.9 (Internal Router)
Vulnerability: SNMP agent enabled with a well known community name
Recommendation: Disable SNMP on router or set string to private.

Device: 10.9.1.13 (Internal Reporting Server holds critical information)
Vulnerability: FTP server running with anonymous log on.
Recommendation: Disable service, or apply security to the ftp server to prevent unauthorized access.

Device: (10.1.2.0 through 10.2.2.255)
Vulnerability: Net meeting service running on several internal machines.
Recommendation: Disable service & look for a more secure solution.

Medium Priority:
Device: 10.1.2.99 (Internal Disclosure application)
Vulnerability: SQL 143 port is open
Recommendation: Disable SQL, or patch system and set up IPSEC for security access

Device: 10.1.2.98 (Internal Web server)
Vulnerability: IIS WebDav exists on servers
Recommendation: Disable if not being used.

Low Priority:

Device: (workstations 10.1.0.0 through ...

Purchase this Solution


Free BrainMass Quizzes
Excel Introductory Quiz

This quiz tests your knowledge of basics of MS-Excel.

Basic UNIX commands

Use this quiz to check your knowledge of a few common UNIX commands. The quiz covers some of the most essential UNIX commands and their basic usage. If you can pass this quiz then you are clearly on your way to becoming an effective UNIX command line user.

Javscript Basics

Quiz on basics of javascript programming language.

Inserting and deleting in a linked list

This quiz tests your understanding of how to insert and delete elements in a linked list. Understanding of the use of linked lists, and the related performance aspects, is an important fundamental skill of computer science data structures.

Basic Networking Questions

This quiz consists of some basic networking questions.