Enterprise Security

Extend your table from Week Two to include Probability of Risk and Impact of Risk on the organization and include mitigation steps of the top 20 pairs.

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

 

Part 1

 

Fill out the final three columns in the table from the previous week. 

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

 

Rate the probability and impact of each vulnerability-threat pair as High, Medium, or Low. Note that these are independent of each other.

 

Rank the pairs in the order they should be addressed by the organization. Note that High/High rows will be at the top and Low/Low rows at the bottom. The team will have to decide where to rank rows not at these extremes.

 

Suggest specific mitigation steps to take for the top 20 rows. You will go into more detail for the final project due in Week Five. Leave the Suggested Mitigation Steps column empty for rows below the top 20.

 

Part 2

 

Prepare a brief explanation on the final rankings.

 

·        

Describe how the team finally ranked the pairs and the reasoning behind the suggested mitigation steps.

·         Focus on the top 20 rows, but cover why the others were ranked lower and will not be addressed at this time.

·         Keep this explanation brief and clear but informative.

 

Riordan Network Vulnerabilities

Vulnerability

Threat

Probability

Impact

Suggested Mitigation Steps

1

USB DRIVE

The most common way to infect a network from inside a firewall

Implement and enforce policies regarding use of such devices.

2

LAPTOP

Can tap directly into the network and infect with malware allowing others access

Implement and enforce policies regarding portable devices.

3

BLUETOOTH

Identity detection, DOS,
involuntary control and access of data

Implement and enforce policies regarding use of such devices.

4

WI-FI

Clear text data can be captured

Implement and enforce policies regarding use of such devices.

5

FIREWALL

Protects content on desktops and in turn keeps entire network safe

Install and configure firewalls

6

NETWORK PROTOCOLS

Flawed unpatched protocols can cause remote sabotage and DOS

Disable unused protocols and monitor ones being used.

7

SMARTPHONES

Potentially pose the same threats as notebooks and thumb drives

Implement and enforce policies regarding use of such devices.

8

OPTICAL MEDIA

Being able to steal and leaking confidential data

Implement and enforce policies regarding access and use of recordable media.

9

ROUTERS

Exposed ports, Network access

Install and configure routers based on industry standards

10

NETWORK CABLES

Reduce the danger of electronic interference or loss of network connectivity

Install cable in areas to minimize interference. Label cables.

11

PRINTERS

While the print task is in the queue, the data is unencrypted and vulnerable to theft

Update printer firmware and keep an update inventory of all printers and drivers

12

FAX MACHINES

Unsecure faxing will put you at risk for confidential and identity theft

Implement and enforce policies regarding information distribution

13

SAN STORAGE

Network availability

Limit access to data storage based on classification and need to know.

14

EMPLOYEES

Individuals having access to restricted area of the network

Maintain a strict access control policy for restricted areas.

15

SERVERS

Open to brute force attacks, botnets, cross-site scripting and DOS

Harden servers against cyber attacks using industry standard or better.

16

WORKSTATIONS

Can be used by attackers as “slave” machines in coordinated attacks.

Harden workstations against cyber attacks using industry standard or better.

17

VIDEO CONFRENCING

Machines set to auto answer will allow the attacker to essentially gain a front-row seat inside corporate meetings

Should be hardened disable auto answer to prevent eaves dropping.

18

THEFT

Attacker steals privilege information to gain access

Access control and password policy

19

IMPERSONATION

Attacker poses as a service provider or custodial crew to physically gain access

Security awareness training and policy

20

LAPTOPS/TABLETS

Portable and easy to hide and attach to network.

Implement and enforce portable device policy

21

USB DEVICES

MP3 Players, etc

Implement strict policies regarding USB devices.

22

FIRE ALARM

Fire retardant system does not work when needed

Test fire alarm system periodically

23

ELECTRICAL POWER

No backup power in case of public power outage

Backup generators and UPS for critical systems

24

AIR CONDITION SYSTEM

Cooling system fail causing equipment to overheat and fail

Service and maintain heating and cooling system.

25

POOR MAINTENANCE

Do not know when unauthorized equipment is attached to the network

Inventory and label all equipment and document change management

Logical Network Vulnerabilities

1

DATABASE

SQL Injection, DOS Attacks, Database Exposure and Privilege elevation

2

VPN

Confidential information can be inadvertently downloaded. Unobstructed route for Malware.

3

MAN-IN-THE-MIDDLE

Attacker monitors and steals
Information in real time

Use cryptography and Hashed Message Authentication Codes

4

PRIVILEGE ESCALATION

Individual gains access to
network higher functions due to misconfiguration

Check Roles, Use strong ACLs; and use standard encryption

5

PHISHING

Used by an attacker to collect sensitive information to gain access

Segment network and encrypt data

6

FOOTPRINTING

Attacker use default username and weak or blank password to gain access to the network

Strong password, do not use blank password or weak

7

HIJACKING

Attacker can take over your internet browser downloading additional malware

Use session and communication encryption. Apply patch to fix vulnerabilities

8

SOCIAL ENGINEERING

Attackers will trick users into revealing their passwords

Security awareness training.

9

PASSWORDS

Easy guessable passwords, hackers gain initial access to a system. 

Enforce strong password; lock out and audit trails

10

DIGITIAL CERTIFICATE

Attackers hack into certificate authorities and issue false certificates for legitimate websites

Revoke PKI and maintain list of revoked keys to id false certificates.

11

OPERATING SYSTEM

If not patched regularly the network is open to security vulnerabilities

Harden OS

12

TCP/IP

Vulnerable to a variety of attacks ranging from password sniffing to denial of service

Disable unnecessary protocols

13

EMAIL

Spyware, Virus, Phishing, and spam

Conduct cyber security awareness to educate end user of email threats.

14

WEB BROWSERS

Attacker can take over your browser making you vulnerable if the browser plug-ins are not fully patched

Configure secure web permissions; Use .Net Framework access control

15

INSTANT MESSAGING

Vulnerable to firewall tunneling, identity theft, data security leaks, and authentication spoofing

Strong password, do not cache password,

16

SECURITY MISCONFIG

Attackers can access networks virtually without attracting attention

Configure based on industry standard. Avoid custom configuration

17

WEB APPLICATIONS

DOS, Elevation of privilege, Information disclosure, and impersonation

Input validation
Use HTMLEncode and URLEncode functions to encode any output

18

MALWARE

Can infect networked resources and possibly bring down the network

Update definition files and patches.

19

SOFTWARE DEFECT

Allows data to be viewed by unauthorized people

Apply updates and patch vulnerabilities. Or uninstall and replace.

20

SPOOFING

An attacker pretends to be an entity to take over communication between systems

Strong authentication.
Do not store secrets Do not pass credentials in plaintext over the wire.
Protect authentication cookies with SSL.

21

DOS ATTACK

An attack on a network that causes a loss of service to users

Resource and bandwidth throttling techniques.
Validate and filter input.

22

SNIFFER ATTACK

Can read, monitor, and capture network data exchanges

Segment network. Encrypt data.

23

BUFFER OVERFLOW

Exploits poorly written software to allow attackers to take over the target system

Validate input
Inspect API managed code.
Use the /GS flag to compile code

24

REMOTE ACCESS

Without the appropriate security measures (SSL VPN), all communications are being transmitted in clear text 

Configure remote access with the necessary security parameters to ensure secure communication.

25

NO ANTIVIRUS

Not Protected against virus and other malware attacks

Install, configure and update antivirus software.

3

Created a table of 50 vulnerabilities and threat pairs relevant to the organization

0.00

0.70

0.85

1.00

0.85

Comment: Trying to find 50 vulnerabilities is not an easy task. Not every item is a vulnerability. Some are attacks, some are threats, and some are vulnerabilities.

Still stressed from student homework?
Get quality assistance from academic writers!

Order your essay today and save 25% with the discount code LAVENDER