WGU D482 performance assessment
Matthew Gronau D482- Secure Network Design DHN1 Task 1: Network Merger and Implementation Company A security and infrastructure problems: • Network security problems in company A: o Company A has multiple unnecessary open ports shown in the security risk analysis. These open ports include ports 21-90 and port 3389. Several of these ports should be secured or disabled. For example, port 23 is a TCP called Telnet. Telnet is an unsecure protocol that gives access to remote systems and has several known vulnerabilities. Port 3389 is the Remote Desktop Protocol (RDP) which is used to connect to computers remotely with a graphical interface. This port should be 昀椀ltered so that access is limited to only certain users within the company, as several known vulnerabilities exist. o Company A has an issue with having very weak password requirements. The security assessment shows that all current users use eight-character passwords. If an attacker gains knowledge of this information, it greatly increases the risk of a password attack and allows the attacker to gain access to that system. Passwords should also be mandated to periodically be changed for users. • Network infrastructure problems in Company A: o Company A shows that it is currently using the Meraki wireless access point for its Windows laptops connectivity. This product has several known vulnerabilities and is also at its End-of-Life, meaning patches for newly discovered vulnerabilities will not be available from the manufacturer. o Company A is showing to have several pieces of equipment in use that are at the End-of-Life. End-of-life equipment is designated as equipment that is no longer supported by the vendor. This is a major security concern. If a piece of equipment is no longer supported by its vendor, updates are no longer required for that equipment. If a vulnerability is discovered on End-of-life equipment, it will not be remediated by the vendor that no longer supports that product. The CISCO 3750X switch is one such device that is currently being utilized by Company A that is at End-of-Life. Company B security and infrastructure problems: • Network security problems in company B: o Company B’s risk analysis assessment shows to have a critical severity with a high risk and effort regarding Remote Code Execution Vulnerabilities for Distributed Ruby. This can allow unauthorized systems to gain access to company B’s systems. o Company B also has weak password policies in place. Multifactor Authentication is not enforced across all users. This puts the company at severe risk if a threat actor gains access to a user’s password. And because all users have local administrative privileges, an unwarranted user could gain access to a lot of con昀椀dential information.
Geschreven voor
- Instelling
- D482
- Vak
- D482
Documentinformatie
- Geüpload op
- 21 juli 2024
- Aantal pagina's
- 13
- Geschreven in
- 2023/2024
- Type
- Tentamen (uitwerkingen)
- Bevat
- Vragen en antwoorden
Onderwerpen
-
wgu d482 performance assessment