Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

NETWORK AND VULNERABILITY ASSESSMENT

Beoordeling
-
Verkocht
-
Pagina's
17
Geüpload op
08-02-2022
Geschreven in
2021/2022

NETWORK AND VULNERABILITY ASSESSMENT NETWORK AND VULNERABILITY ASSESSMENT 2 Final Project ABC Manufacturing has hired you as a security consultant to identify security vulnerabilities, provide recommendations, and implement approved changes. Management at ABC has provided you with access to their server networking environment. When the network was set up, the network technician was unfamiliar with the firewall appliance and may have opened more ports than necessary. Only web services (HTTP and HTTPs) and map service (SMTP) should be allowed from outside of the network Executive Summary Purpose The reason for this vulnerability report is to access any breakdown in security inside the system of ABC Manufacturing. The vulnerability report isn't just to distinguish potential dangers to the system; additionally, it shows how to alleviate and solidify the system to close or potentially keep any outside impedances on the network. This report proposes suggestions of enhancements; it is eventually up to ABC administrators to decide the correct game-plan. It is exhorted that their choice should contemplate this report as it features vulnerabilities on the system and hardware, ventures to close those vulnerabilities, ventures to avert future vulnerabilities, and strategies for solidifying the system and hardware. Finally, its suggested that administrators of ABC should search for additional choices that can help with the proposals and solidifying or get in touch with us for a rundown of organizations that can help accomplish these suggestions. Methodology

Meer zien Lees minder
Instelling
Vak

Voorbeeld van de inhoud

Your text here 1
Running head: NETWORK AND VULNERABILITY ASSESSMENT 1




Final Project

Enjoli Lawson

SNHU

,NETWORK AND VULNERABILITY ASSESSMENT 2


Final Project

ABC Manufacturing has hired you as a security consultant to identify security

vulnerabilities, provide recommendations, and implement approved changes. Management at

ABC has provided you with access to their server networking environment. When the network

was set up, the network technician was unfamiliar with the firewall appliance and may have

opened more ports than necessary. Only web services (HTTP and HTTPs) and map service

(SMTP) should be allowed from outside of the network

Executive Summary

Purpose

The reason for this vulnerability report is to access any breakdown in security inside the

system of ABC Manufacturing. The vulnerability report isn't just to distinguish potential dangers

to the system; additionally, it shows how to alleviate and solidify the system to close or

potentially keep any outside impedances on the network. This report proposes suggestions of

enhancements; it is eventually up to ABC administrators to decide the correct game-plan. It is

exhorted that their choice should contemplate this report as it features vulnerabilities on the

system and hardware, ventures to close those vulnerabilities, ventures to avert future

vulnerabilities, and strategies for solidifying the system and hardware. Finally, its suggested that

administrators of ABC should search for additional choices that can help with the proposals and

solidifying or get in touch with us for a rundown of organizations that can help accomplish these

suggestions.

Methodology

The instruments and methods that were utilized to arrange this report were essential

capacities utilizing the commands on the Windows and Linux Working Frameworks. My first

, NETWORK AND VULNERABILITY ASSESSMENT 3


task was to recognize what open ports were on the system. Having pointless ports open is a

major hazard and it is a simple path for an aggressor to invade the system. Utilizing different

firewalls and tenets, I shutdown any superfluous ports, leaving just those required for business

work at ABC. At that point I utilized the Greenbone security programming that checks the

system and recognizes what vulnerabilities are available on the system. The product additionally

portrays the defenselessness and offers the answer for it.

I also, had the ability to additionally investigate the system through the vulnerabilities

and feature how effortlessly it was to get to the system from an outside system and take, modify,

and actualize different tasks. There was no anti-virus software on the system I could find. One of

my proposal was to introduce such a product. I fundamentally looked for undeniable flaws on the

system. Such flaws go unnoticed because they are so fundamental to disregard. Once, simple

fixes are executed, the greater hazard's will be addressed and those vulnerabilities wind up

greater when littler vulnerabilities are not impregnable.

Security Posture

ABC’s present security would be appraised low quality. In any case, if the arrangements,

proposals, and suggestions are executed, the stance of the system will enhance to solidify. It has

low quality because of the way that an intruder can assault the system and effectively go

undetected on the grounds that there were no product's set up to help recognize irregular

exercises on the system. The conspicuous warnings went unchecked like anti-malware, an

excessive number of unreasonable administrator accounts with simple passwords, no explicit

policies for different occupation jobs, open firewall, and different vulnerabilities.

Geschreven voor

Vak

Documentinformatie

Geüpload op
8 februari 2022
Aantal pagina's
17
Geschreven in
2021/2022
Type
Tentamen (uitwerkingen)
Bevat
Onbekend

Onderwerpen

$4.28
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
EvaTee Phoenix University
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
5202
Lid sinds
4 jaar
Aantal volgers
3567
Documenten
55582
Laatst verkocht
7 uur geleden
TIGHT DEADLINE? I CAN HELP

Many students don\'t have the time to work on their academic papers due to balancing with other responsibilities, for example, part-time work. I can relate. kindly don\'t hesitate to contact me, my study guides, notes and exams or test banks, are 100% graded

3.8

947 beoordelingen

5
451
4
167
3
171
2
48
1
110

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen