Monday, May 6, 2019
Enterprise Networking and Security Assignment Example | Topics and Well Written Essays - 3000 words
Enterprise Ne bothrking and Security - Assignment Example1 Introduction It has been concluded by some experts that the year 2012 is considered to be the worst year in terms of computer network trade protection department breaches (Schirick 2012). Likewise, the year that has not even passed the half year mark, some of the foremost companies were sufferers of network security breaches resulting in massive losses (Schirick 2012). However, the news buzz simply highlights Sony and Citibank to be victims of network security breaches, as these companies are popular among the public. The other sides of the picture highlights organizations of all sizes are affected by the consequences of network security breaches. Likewise, it sight be concluded that network security risks are continuously evolving, modifying and growing at a fast pace. Organizations normally install a firewall and even intrusion undercover work systems that triggers alerts of any suspicious activity, as these two comp onents scarce covers the technical domain and not the human and physical domain. The current network scenario is utilizing a realistic Private Connection that is connecting one or more sites. However, the VPN connection is likewise entitled to allow net income traffic on the same dedicated line from the Internet Service Provider. Moreover, the current network only utilizes a single firewall that is located at the main campus of the university. It concludes that the rest of the two remote sites are only protected via a simple Network address translation function that is incorporated in a DSL modem. Moreover, there are no advanced security appliances such as Intrusion detection systems for analyzing and monitoring any suspicious activity that may possibly become a threat to the Universitys computer network. Moreover, there is no patch management for updating security patches in the workstations connected to the network. at that place are no indications of hardening servers for in stance, email server, application server, centralized server and database server must be hardened and needs physical protection as well. 2 Security Vulnerabilities The current network security vulnerabilities go forth be accessed in three categories i.e. logical security, internal security and external security. As removed as logical security is concerned, we can see that the fig 1.1 demonstrates a firewall, Microsoft Internet Security and speedup (ISA) server and a domain controller with Microsoft Active Directory. The three categories for network vulnerabilities are categorized as below 2.1 Logical Vulnerabilities The current logical controls for protecting information assets within the network are brisk Microsoft Active directory, ISA server and a Firewall. The Microsoft active directory is not primarily a security control, as it does not mitigate any risks associated with viruses, worms, Trojans, phishing, spam, denial of service attacks etc. however, it provides a secure adm inistration of user profiles and record sharing features. File sharing threats are spreading on a rapid pace, as all now and then, new file sharing technologies are getting being developed and in demand. Controls will not only provide value from all network based services, but will also augment productivity for the organization in terms of revenue, customer loyalty and competitive advantage. Workgroup based milieu is not centralized. For instance,
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.