Tuesday, December 31, 2019

Network Security Products Risk Assessment Report

Network Security Products LabNet Risk Assessment Report Submitted to Professor Tolson Capitol Technology University By Samantha Fitzpatrick Submitted: 28 June 2015 EXECUTIVE SUMMARY The Network Security Products (NSP) branch understands that classified, sensitive information cannot be protected unless it has the proper safeguards and security system in place. Capitol Technology University student, Samantha Fitzpatrick, has been tasked to conduct a risk assessment of the LabNet system. This Risk Assessment Report checks the systems/users provided to eliminate and mitigate any vulnerabilities found in the risk assessment. The scope of this risk assessment was limited to the security controls applicable to the LabNet’s environment. The baseline security requirements addresses security controls in the areas of computer hardware and software, data, operations, administration, management, information, facility, communication, personnel, and contingency for NSP. The LabNet system risk assessment was conducted in accordance with the steps described in National Institute of Standards and Technology (NIST) Special Publication (SP) 800-30, Risk Management Guide for Information Technology Systems. The risk assessment of LabNet identified 6 vulnerabilities in the areas described above. These vulnerabilities can be mitigated with the recommended safeguards provided at the end of this assessment. 2 vulnerabilities were rated High, 2 were rated Moderate and 2 wereShow MoreRelatedThe Security Of A Home Network1352 Words   |  6 PagesTechnology Report Yu Lun Chou 1730799 MADS 6638 Computer Security Admin. George Thucydides 4/26/2016 Table of content Introduction Inventory Vulnerability Test Protection Support Incident Response Introduction Information play an essential role in everywhere. For a company, in order to run the company well, information management is a necessary skill, and leaking information, odds are , causes significant damage to the company. Even though a private network will not haveRead MoreRisk Assessment Is The Top Priority For Any Type Is Impenetrable1671 Words   |  7 PagesFindings Networks are very vulnerable to any holes that are within its infrastructure. In fact, many may believe that they have the best security measures in place, but no system or network of any type is impenetrable (Trim Lee, 2014). Risk assessments are extremely necessary so that corrective countermeasures can be applied and overall security can be enhanced (Broder Tucker, 2011). Security should ensure that this is the top priority for any company or organization. A detailed risk assessment showsRead MoreResearch And Development Of A Mobile Web Application1329 Words   |  6 PagesWeb Application For Conducting Risk Assessments Stephen J. Donnellon Walsh College of Accountancy and Business Abstract The information age has brought with it the need to secure computer networks against unauthorized access, data manipulation and identification protection. â€Å"There is no such thing as 100% secure† or â€Å"if an attacker wants something bad enough they will get it†, is heard often when information assurance is discussed. In fact, as one Information Security professional well knows, whenRead MoreCase Analysis : Topaz Information Solutions1184 Words   |  5 Pagesis required to complete an annual security risk assessment to evaluate the physical, administrative and technical safeguards implemented to comply with HIPAA’s Privacy and Security Rules. The Privacy and Security Rules require that a covered entity obtains satisfactory assurances from its business associates that the business associate appropriately safeguards the PHI it receives, creates, uses or transmits on behalf of the covered entity. The Risk Assessment Team evaluated the physical, administrativeRead MoreIs Cybersecurity A Top Priority For Just About Every Organization?1248 Words   |  5 Pagespenetration testing on a standard basis, so vulnerabilities present on the hardware and software of the company may be detected. Also, to help check, which security protocols have been installed correctly and help determine if the system is vulnerable to malware and bugs in the current software. This proposal recommends Nessus Tenable, a software security testing tool, that prevents hackers from gaining confidential resources from the company. Without this software, ARC is vulnerable to these attacks thatRead MoreA Report On Suntrust Bank1671 Words   |  7 Pagesorchestrated by the hacktivist group Izz ad-Din al-Qassam (Kitten, 2012). SunTrust plc. is committed to helping their customers to up their online transactions secure and safe. Despite the various security measures, features and procedures implemented by SunTrust to secure their network and server from cyber-attacks as well as to help protect consumers from scammers and unauthorized access to their accounts, yet, they become a victim of the hacktivist group Izz ad-Din al-Qassam who insistRead MoreA Report On Suntrust Bank943 Words   |  4 Pages(DDos) orchestrated by the hacktivist group Izz ad-Din al-Qassam† (Kitten, 2012). SunTrust plc. is committed to helping their customers to up their online transactions secure and safe. Despite the various security measures, features and procedures implemented by SunTrust to secure their network and server from cyber-attacks as well as to help protect consumers from scammers and unauthorized access to their accounts, yet, they become a victim of the hacktivist group Izz ad-Din al-Qassam† who insistRead MoreSecurity : A Critical Management Function1421 Words   |  6 PagesCCJS 345 Intro to Security Management Project 2: Paper on Security Roles 11 September 2014 â€Æ' Security is a critical management function in most businesses. Where security strategies and operations were almost unheard of 35 years ago, there are now vice presidents of loss prevention and even chief security officers (CSOs) at most multi-national corporations who report directly to the chief executive officer (CEO) or the chief operating officer (COO). In most instances, the security position has becomeRead MoreThe Current World Population Of The Internet Essay1334 Words   |  6 Pagesin comparison to the number of devices connected to the internet. Is estimated that over 10 billion devices were connected in 2015 and that number is expected to double or triple within the next half decade [1]. An average person owns at least 4 network connectable device and with rapid technological growth and the internet of things (IOT) that number is only going to increase. The age of connected devices started with smart phones and tablets, but IOT brings with it a plethora of devices and ga dgetsRead MoreResearch On Cloud Computing Risks And Risk Assessment Frameworks1296 Words   |  6 PagesProject #2: Research on cloud computing risks and risk assessment frameworks 4 4. Learnings conclusion 7 1. Abstract This report describes the activities and tasks carried out during a 10 - week, full-time internship at the American International Group (AIG). The document contains information about AIG and the responsibilities performed throughout the period between June 1st and August 14th 2015. More than a plain account of tasks, the objective of this report is to reflect upon the experiences collected

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.