Mohan Satya Sriram Yarramsetty University of CumberlandsTelecomm Network Security (ISOL-532-A03) - First Bi-Term
Part 1 - Network Survey 1. By using NetWitness Investigator accessed PCAP data. 2. Hosts172.30.0.117188.8.131.52184.108.40.206220.127.116.1118.104.22.16822.214.171.124(local host)3. Protocols
4. List of services and Hosts 172.30.0.2 - ftp172.30.0.4 - tftp172.30.0.8 - ftp5.Network security is the vital part for any organization. Because the data is continuously at threat, security must be an urgency. Computer hardware that can support in this venture include a frontier routerand firewall to filter inbound and outbound traffic. Authentication procedures can be added to group strategy to make available for only permitted members. Offering employees with access with only what they need to do their businesses and locking workspaces due to immobility can be helpful. When an employee attempts to log in with an incorrect secret code, an administrator must be contacted. Another great way to reduce security infringements is to educate workers. An informed employee is an equipped employee when it comes to security measures. Passwords must not be revealed/shared. Before opening Email, links this should be validated and examined by antivirus application. Phishing attacks can be very misleading, company information should never be revealed to outside sources. Server security is of extreme importance and must be taken seriously. Administrator password should not be shared and must be changed often to frustrate attackers. In order to avoid of getting physical attacks Servers should be protected by locking them behind the doors. Keycard access is the most ideal approach to monitor the workers that access this safe zone. Security is a significant measure that should not be taken casually and must be strictly administered. Everyone who works for the company should bring priority towards the security(Saleous & Trabelsi, 2019).
Part 2 - Network Design1.Accessed PCAP files, Nmap scan.xml & Nessus report2.VulnerabilitiesClear- TextRemote Unencrypted Telnet sends credentials and commands data in cleartext Port telnet (23/tcp) remote Unencrypted Telnet server credentials and commands are sending in cleartextPort telnet (21/tcp) remote Unencrypted Telnet server credentials and commands are sending in cleartext3.Network design to guarantee the security of internal access while maintaining the public Website accessibilityThe company corporation techs had a violation into the network and taken data information. After the hack, net witness scans were used in examining the traffic and many weaknesses in the network were identified. A new plan will be developed to train workforce on significance of security and policies will also be made to keep the network safe and at excellent performances.