Preview

Preliminary Security Assessment

Powerful Essays
Open Document
Open Document
1453 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Preliminary Security Assessment
u04a1 Preliminary Security Assessment

TS5311 Enterprise Security February 3, 2013

Introduction The number one responsibility of the Information Assurance/Network Security Officer(s) is to maintain the best security posture for the network that is possible. This task also means that the confidentiality, availability and integrity of the system are maintained. One of the first steps towards this is to perform an assessment of the potential issues with all areas of the network. A preliminary security assessment will begin the task of identifying a list of vulnerabilities (weaknesses and flaws) that could possibly be exploited by a threat (Develop, n.d.). Vulnerability analysis can encompass the following five security control areas: * Technical – hardware, software, system architecture, and modes of communication * Operational – procedures performed with respect to the network * Administrative – administrative procedures that affect the network * Physical – the physical layout and the access to the facilities and areas where network related systems are housed * Personnel – policy, process, and procedures as related to staff having access to the system (Develop, n.d.)

Analyzing The Infrastructure An initial task in a security assessment will focus on the basic hardware, software, and network of the system, also known as the infrastructure. Identifying types of hardware and software will dictate a large part of the requirements necessary to protect the environment. Also, a thorough analysis of the hardware will help in identifying what exists where. This information can be used for planning for replacement (Chapter, 2003). The infrastructure consists of approximately 4000 workstations, several hundred servers, a large number of switches and routers scattered between approximately 20 buildings located across approximately 10 miles of



References: Sarrel, M. (2003, December 30). Network Security: Know Your Weaknesses | Roundup | PCMag.com . Technology Product Reviews, News, Prices & Downloads | PCMag.com | PC Magazine. Retrieved January 30, 2013, from http://www.pcmag.com/article2/0,2817,140

You May Also Find These Documents Helpful

  • Powerful Essays

    INDP Final Project

    • 1793 Words
    • 4 Pages

    Riordan corporate office is divided into several different departments Marketing, Finance, Corp, and is the main Research and Development department of the organization. Riordan will not make drastic changes to the network just upgrades to the LAN at the respective branches. The 100BaseT backbone can support 100 Mbps to the departments and the 1Gbps fiber backbone in the R&D department can handle the information traversing in and out of that department. Upgrading the hardware in the corporate office will completed during the down hours of the San Jose branch so work will not be interrupted. The 24 port HUB will be taken off the network and replaced with a switch supporting the NAS and the three servers. Replacing the HUB will separate the collision domains and help the flow of traffic to and from the server area. The…

    • 1793 Words
    • 4 Pages
    Powerful Essays
  • Better Essays

    INDP Final Project

    • 3551 Words
    • 12 Pages

    * A traditional LAN standard for Ethernets is a logical characteristic of a bus topology. Other…

    • 3551 Words
    • 12 Pages
    Better Essays
  • Powerful Essays

    IS3110 U5L1

    • 912 Words
    • 4 Pages

    One of the most important first steps to risk management and implementing a security strategy is to identify all resources and hosts within the IT infrastructure. Once you identify the workstations and servers, you now must then find the threats and vulnerabilities found on these workstations and servers. Servers that support mission critical applications require security operations and management procedures to ensure C-I-A throughout. Servers that house customer privacy data or intellectual property require additional security controls to ensure the C-I-A of that data. This lab requires the students to identify threats and vulnerabilities found within the Workstation, LAN, and Systems/Applications Domains.…

    • 912 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    This report gives a brief description the general security solutions planned for the safety of data and information that belongs to the organization. The outline will provide elements of a multi-layered security plan, and will indicate a general security solution for each of the seven domains of a typical IT infrastructure. Also I will describe a layer of security for each of the seven domains.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Network: The network should be designed with security in mind. Its structure must support the company’s policies, relevant laws and regulations, without impairing the organization’s ability to conduct business. The network should be logically and physically separated into distinct and manageable security zones. Traffic between the security zones must be inspected and filtered, to ensure that only authorized network use is permitted, and all access is recorded for future auditing. Multiple devices and methods should be used to ensure security across all parts of the network. In preparing this recommendation, network security design principles have been drawn from the Cisco SAFE Reference Guide [33] and the Council on CyberSecurity’s Critical Security Controls for Effective Cyber Defense Version 5.1 [34].…

    • 598 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    INDP Part 3

    • 1311 Words
    • 4 Pages

    The equipment expected to effectively set up the LAN networks at every area are a switch/firewall mix, a modem, remote network interface cards for every workstation, and the cabling important to associate the switch to the modem and the modem to the Internet to secure the WAN association. Servers and their arrangement additionally have influence in keeping networks and information safe. Each bit of equipment and programming are essential in shielding the network and the information from electronic dangers.…

    • 1311 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    Aircraft Solution’s Commercial Division, connects to the rest of the world via the Internet causing hardware vulnerabilities due to the absence of security and safety that should be implemented, leaving great concern for major security threats. The Commercial Division is only able to access important…

    • 745 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    IS4560 Graded Assingments

    • 5563 Words
    • 23 Pages

    This particular report provides information on cutting edge and growing threats to Internet security. Using the background provided by the class so far, as well as your own critical thinking skill, you need to write a summary of the top threats described in the whitepaper. Explain why the threats are important issues and how these threats have changed or are changing.…

    • 5563 Words
    • 23 Pages
    Powerful Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    Introduction to Information Security © ITT Educational Services, Inc. All rights reserved. Page 2 Key Concepts  Attacks, threats, and vulnerabilities in a typical IT infrastructure …

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    Security Assessment

    • 824 Words
    • 4 Pages

    Choose one of the Facts for Consideration sections from Ch. 3 of the text and list the page number for the section you chose. Then, complete the following table. List five threats appropriate to the environment from the section you chose. Rate the risk for each threat from 0 (low) to 10 (high). Then, list five appropriate countermeasures. Once you complete the table, write a brief explanation of the countermeasures for the two threats with the highest risk total, stating how the countermeasure reduces the risk associated with that threat.…

    • 824 Words
    • 4 Pages
    Good Essays
  • Better Essays

    May 9, yAs new technology emerges, the Internet evolve and computer network gets bigger and bigger, the need for network security has become one of the most important factors for all organizations and companies to consider (Popescu, 2013). Network security is important for an organization or company’s well being. Increasing network security decreases the change privacy spoofing, identity or information theft. Network security is something that companies should take seriously. An unsecured network system can comprises a company’s files and reputations all at the same time. An organization needs to use a tool that will ensure security efficiency and monitoring. North Shore Medical Research (NSMR)…

    • 1007 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Supervised facilities operations, physical security, safekeeping, custody and control of confined prisoners and staff of 100.…

    • 1108 Words
    • 5 Pages
    Satisfactory Essays
  • Better Essays

    Dougherty, C., Householder, A., & Houle, K. (2002). Computer attack trends challenge Internet security. Computer, 35(4), 0005-7.…

    • 1278 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    This work contains INF 220 Week 5 Assignment Final Paper Information Systems as a Whole…

    • 496 Words
    • 3 Pages
    Satisfactory Essays
  • Best Essays

    Gi-Fi

    • 3711 Words
    • 15 Pages

    UACEE International Journal of Advances in Computer Networks and its Security - Volume 2: Issue 3 [ISSN 2250 - 3757]…

    • 3711 Words
    • 15 Pages
    Best Essays