Network Assignment.docx - Mohan Satya Sriram Yarramsetty University of Cumberlands Telecomm Network Security(ISOL-532-A03 First Bi-Term Part 1 Network

Network Assignment.docx - Mohan Satya Sriram Yarramsetty...

This preview shows page 1 - 5 out of 11 pages.

Mohan Satya Sriram Yarramsetty University of Cumberlands Telecomm Network Security (ISOL-532-A03) - First Bi-Term
Part 1 - Network Survey 1. By using NetWitness Investigator accessed PCAP data. 2. Hosts 172.30.0.1 172.30.0.2 172.30.0.4 172.30.0.8 172.30.0.9 172.30.0.200(local host) 3. Protocols
4. List of services and Hosts 172.30.0.2 - ftp 172.30.0.4 - tftp 172.30.0.8 - ftp 5. Network security is the vital part for any organization. Because the data is continuously at threat, security must be an urgency. Computer hardware that can support in this venture include a frontier router and firewall to filter inbound and outbound traffic. Authentication procedures can be added to group strategy to make available for only permitted members. Offering employees with access with only what they need to do their businesses and locking workspaces due to immobility can be helpful. When an employee attempts to log in with an incorrect secret code, an administrator must be contacted. Another great way to reduce security infringements is to educate workers. An informed employee is an equipped employee when it comes to security measures. Passwords must not be revealed/shared. Before opening Email, links this should be validated and examined by antivirus application. Phishing attacks can be very misleading, company information should never be revealed to outside sources. Server security is of extreme importance and must be taken seriously. Administrator password should not be shared and must be changed often to frustrate attackers. In order to avoid of getting physical attacks Servers should be protected by locking them behind the doors. Keycard access is the most ideal approach to monitor the workers that access this safe zone. Security is a significant measure that should not be taken casually and must be strictly administered. Everyone who works for the company should bring priority towards the security (Saleous & Trabelsi, 2019) .
Part 2 - Network Design 1. Accessed PCAP files, Nmap scan.xml & Nessus report 2. Vulnerabilities Clear- Text Remote Unencrypted Telnet sends credentials and commands data in cleartext Port telnet (23/tcp) remote Unencrypted Telnet server credentials and commands are sending in cleartext Port telnet (21/tcp) remote Unencrypted Telnet server credentials and commands are sending in cleartext 3. Network design to guarantee the security of internal access while maintaining the public Website accessibility The company corporation techs had a violation into the network and taken data information. After the hack, net witness scans were used in examining the traffic and many weaknesses in the network were identified. A new plan will be developed to train workforce on significance of security and policies will also be made to keep the network safe and at excellent performances.

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture