NETWORK SECURITY 1.docx - RUNNING HEDA NETWORK SECURITY...

This preview shows page 1 - 3 out of 6 pages.

RUNNING HEDA: NETWORK SECURITY ASSESSMENT 1 PREPARDED FOR UNIVERSITY OF MARYLAND UNIVERSITY COLLEGE PREPARED BY USIFU KOROMA
Image of page 1

Subscribe to view the full document.

RUNNINGHEAD: NETWORK SECURITY ASSESSMENT 2 1. VULNERABILITY ASSESSMENTS There is no business nowadays that does not rely on IT in some point in time. While other business would not survive without technology. With the increased use and dependency here comes with the increased risks. Many security researchers agree that, it is not if hackers will strike, it’s when[1].For that reason without the implementation of proper security measures, any business could become a target to hacking that will leading to loss of data valuable. Downtime and loss of intellectual property, improper use of the resources network can lead to theft and various other issues. For these reason it is vital for every business to conduct a regular vulnerability assessment to help identify weakness and vulnerability on their network. This assessment can identify a wide range of vulnerabilities in web applications, configuration network and, operating system to name a few, so that correct measured can be taken. Other measure can help protect against unknown threats if it is properly. After a review of the current configuration of the network setup and computer systems server vulnerabilities were found that should be address. While the use of strong user Account Password can limited the number of user who can has access to enter the web site, Vulnerability in the design of user account password was recently exposed, by unsecured user Account/weak password that user can access less than five minute and a minimal amount of user to access the Account [2], that would-be thieves can access the Account through unsecured user account. One of the most common vulnerabilities of weak passwords or user account with no password was discovered on the network [3].this can potentially give a person example employee or hacker unauthorized access to sensitive information.
Image of page 2
Image of page 3
You've reached the end of this preview.

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern