ABC Manufacturing Network and Vulnerability Assessment
Leyland Lockhart
Southern New Hampshire University
IT-320 Network Security
Professor Noni Anderson
August 19, 2021
, Running Head: ABC MANUFACTURING 2
As a security consultant for ABC Manufacturing, it is my responsibility to identify security
vulnerabilities, provide recommendations and implement approved changes. ABC Manufacturing has
expressed concern that during the network implementation process, the network technician may have
inadvertently opened more ports than necessary. Ports should be open for necessary services only as
cyber criminals are able to scan for open ports and exploit this vulnerability. Therefore, all unused ports
should be closed. In addition, ABC Manufacturing has requested confirmation of malicious software
protection. Malicious software protection will detect and protect ABC Manufacturing’s network from
programs designed to harm their computers and/or devices. Lastly, using intrusion detection tools I will
analyze ABC Manufacturing’s network traffic to identify any potential security threats.
I assessed the security posture of ABC Manufacturing’s network in order to identify existing
security vulnerabilities. Using security scanner, Network Mapper (Nmap) and the Nmap security
scanner GUI, Zenmap, I scanned both the pfSense firewall (ip 203.0.113.100) and the Windows server
firewall (ip 192.168.1.10) to determine if any threats to the firewall existed. I scanned both devices for
unused or unnecessary ports. Currently, the pf Sense firewall is configured to redirect incoming requests
for the 11 ports to the Windows Server machine on the Internal Network and the host machine is
configure to allow 20 ports. Ports such as, Telnet and rmiregistry can be closed as there are more
modern protocols in use. Several open ports are identified as “unknown.” This will require additional
research since no entry was input into the port map file for these ports. Once the protocols for these
unknown ports have been identified, I will then determine whether they should be closed. Open ports on
a server can potentially allow hackers to exploit vulnerabilities of ABC Manufacturing’s network.