short cyber security paper

Swamped with your writing assignments? We'll take the academic weight off your shoulders. We complete all our papers from scratch. You can get a plagiarism report upon request just to confirm.


Order a Similar Paper Order a Different Paper

Prompt: ABC Manufacturing has hired you as a security consultant to identify security vulnerabilities, provide recommendations, and implement approved changes. Management at ABC has provided you with access to their server networking environment. When the network was set up, the network technician was unfamiliar with the firewall appliance and may have opened up more ports than necessary. Only web services (HTTP and HTTPs) and map service (SMTP) should be allowed from outside of the network. The client’s internal team has provided a list of tests they want performed based on their own initial analysis:  Scan the firewall for open ports using the tools available to you in the lab environment.  Determine what the settings on the firewall are for incoming traffic that is allowed. What is it set on? What vulnerabilities does it pose if they are not set?  Use Microsoft Security Essentials on the client and server Windows machines to determine if vulnerabilities exist.  Conduct a vulnerability scan on each host desktop using the OpenVAS application on the Kali 2 Linux Box.  Find vulnerabilities specific to intrusion detection and prevention systems using Wireshark and NetworkMiner. In the first part of Milestone One, you will be assessing the network. This means you will be presenting whatever information you discover as a result of scanning, reviewing settings, etc. You will be asked to collect evidence to show your findings. The second part of the assignment has you interpreting the results of the scans/settings you have reviewed. This is where you provide more detail related to the vulnerabilities that were uncovered, describing the types of threats these vulnerabilities pose. Specifically, the following critical elements must be addressed in Milestone One:  Network Assessment – Gathering Evidence of the Vulnerabilities: In this part of your milestone, you will assess the security posture of this network to find what security vulnerabilities currently exist using the appropriate scanning tools and techniques looking at both the pfSense firewall and the Windows Server firewall for the Windows Server host (192.168.1.10). Please see the Final Project navigation pane in the InfoSec environment for a diagram of the systems, users IDs, and passwords you will need to use in that environment. Be sure your responses and supporting evidence address the following questions: a) Firewall: Determine threats to the firewall. For example, are there any ports that are open unnecessarily or unused? Support your response with evidence. b) Virtual Machine (host): Determine threats to the virtual machine (host). For example, are there any ports that are open unnecessarily or unused? Support your response with evidence. c) Determine if there is malicious software protection in place using the tools provided to you. Support your response with evidence.  What kinds of antivirus software, malware protection, or other security software is in place?  What are the risks associated with the gaps in malicious software prevention?  What are the risks associated with leaving the malicious software prevention strategies as they are now? d) Intrusion Detection: What security threats are you finding in the output as you analyze the network traffic? Support your response with evidence from your Wireshark and NetworkMiner tools.  Vulnerability Assessment – Interpreting Evidence of Vulnerabilities: In this part of your milestone, you will interpret evidence gathered from the network assessment you conducted in Section I to discuss what security vulnerabilities currently exist. In particular, look closely at the scan you performed on the firewall and your Nmap and Zenmap results. Interpret the output from these tools. Be sure your responses and supporting evidence address the following questions: a) What are the vulnerabilities specific to the network traffic? Explain what kind of security threats the vulnerabilities pose. b) What are the vulnerabilities specific to the anti-malware systems (especially centrally managed solutions with aggregated reporting)? Explain what kind of security threats the vulnerabilities pose. For example, what do the Windows security settings tell you? c) What are the vulnerabilities specific to the operating systems and workstations? Explain what kind of security threats the vulnerabilities pose. For example, what did you find when you used the OpenVAS tool? d) What are the vulnerabilities specific to the network hardware (firewall)? Explain what kind of security threats the vulnerabilities pose. Rubric Guidelines for Submission: The written portion of your submission should be 3 to 4 pages in length (in addition to small screenshots, the title page, and references). Use double spacing, 12-point Times New Roman font, and one-inch margins. Sources should be cited according to APA style.

Let me know if you have any questions.

Writerbay.net

We offer CUSTOM-WRITTEN, CONFIDENTIAL, ORIGINAL, and PRIVATE writing services. Kindly click on the ORDER NOW button to receive an A++ paper from our masters- and PhD writers.

Get a 10% discount on your order using the following coupon code SAVE10


Order a Similar Paper Order a Different Paper