Running head: NETWORK AND VULNERABILITY ASSESSMENT 1
Final Project
Enjoli Lawson
SNHU
,NETWORK AND VULNERABILITY ASSESSMENT 2
Final Project
ABC Manufacturing has hired you as a security consultant to identify security
vulnerabilities, provide recommendations, and implement approved changes. Management at
ABC has provided you with access to their server networking environment. When the network
was set up, the network technician was unfamiliar with the firewall appliance and may have
opened more ports than necessary. Only web services (HTTP and HTTPs) and map service
(SMTP) should be allowed from outside of the network
Executive Summary
Purpose
The reason for this vulnerability report is to access any breakdown in security inside the
system of ABC Manufacturing. The vulnerability report isn't just to distinguish potential dangers
to the system; additionally, it shows how to alleviate and solidify the system to close or
potentially keep any outside impedances on the network. This report proposes suggestions of
enhancements; it is eventually up to ABC administrators to decide the correct game-plan. It is
exhorted that their choice should contemplate this report as it features vulnerabilities on the
system and hardware, ventures to close those vulnerabilities, ventures to avert future
vulnerabilities, and strategies for solidifying the system and hardware. Finally, its suggested that
administrators of ABC should search for additional choices that can help with the proposals and
solidifying or get in touch with us for a rundown of organizations that can help accomplish these
suggestions.
Methodology
The instruments and methods that were utilized to arrange this report were essential
capacities utilizing the commands on the Windows and Linux Working Frameworks. My first
, NETWORK AND VULNERABILITY ASSESSMENT 3
task was to recognize what open ports were on the system. Having pointless ports open is a
major hazard and it is a simple path for an aggressor to invade the system. Utilizing different
firewalls and tenets, I shutdown any superfluous ports, leaving just those required for business
work at ABC. At that point I utilized the Greenbone security programming that checks the
system and recognizes what vulnerabilities are available on the system. The product additionally
portrays the defenselessness and offers the answer for it.
I also, had the ability to additionally investigate the system through the vulnerabilities
and feature how effortlessly it was to get to the system from an outside system and take, modify,
and actualize different tasks. There was no anti-virus software on the system I could find. One of
my proposal was to introduce such a product. I fundamentally looked for undeniable flaws on the
system. Such flaws go unnoticed because they are so fundamental to disregard. Once, simple
fixes are executed, the greater hazard's will be addressed and those vulnerabilities wind up
greater when littler vulnerabilities are not impregnable.
Security Posture
ABC’s present security would be appraised low quality. In any case, if the arrangements,
proposals, and suggestions are executed, the stance of the system will enhance to solidify. It has
low quality because of the way that an intruder can assault the system and effectively go
undetected on the grounds that there were no product's set up to help recognize irregular
exercises on the system. The conspicuous warnings went unchecked like anti-malware, an
excessive number of unreasonable administrator accounts with simple passwords, no explicit
policies for different occupation jobs, open firewall, and different vulnerabilities.