This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
Uncategorized

Vulnerability Assessment Report

Pssst… we can write an original essay just for you.

Any subject. Any type of essay. We’ll even meet a 3-hour deadline.

GET YOUR PRICE

writers online

Vulnerability Assessment Report

 

Introduction

One of the greatest threats and challenges to most current businesses is the exposure or loss of critical business data and information commonly as a result of either a data breach or cyber-attack. For any cybersecurity professional who has the impression as if they are a rabbit in the headlights, this should not be a cause for alarm, for they are not alone. A study on the causes leading to the rising spark on cybersecurity threats and attacks concluded that even though a vast majority of organizations are very aware of the threats they face, very few are in a position to effectively manage them (Wang, 2018). With platforms, and technologies such as web browsers, and emails being some of the most common attack vectors by malicious users.

Hence the need and importance of carrying out a vulnerability assessment report on such technologies applicable to the entire network infrastructure. Vulnerability assessment helps in the identification of potential network risks or vulnerabilities, thus leading to the development of valid mitigation measures against them, as well as creating the necessary awareness to the security professionals. Without proper observation and control, these threats can hinder an organization’s ability to deliver their goods and services to their customer base. The threats associated with computer-based attacks and intrusions is rising and needs to be addressed appropriately.

Communication plays a very crucial role in the general performance and running of any organization. Therefore, technologies such as the E-mail services which are in most cases supported by the web browsers in performance are to be critically analyzed in search of possible threats that may ruin or damage the integrity of the entire network infrastructure. Several frameworks and security bodies have dedicated roles in displaying such threats to help organizations in mitigating against them. For instance, the NIST publication, IEEE 2000, and the White House Communications on critical infrastructure protection list the below threats potential to Emails, and web browser activities.

Figure 1: Threats to Computer Networks and Technologies

The more rapid new technologies on the internet and mailing services continue to emerge, the more complex and difficult it becomes in the bid to successfully monitor and protect company critical infrastructures. Consequently, increasing the cyberattack surface. The below threat matrix has been established and considered for both Email services and Web browsing activities respectively;

Figure 2: Threat Matrix for Web Browsers

Figure 3: Threat Matrix for Email’s

 

Email and Web browsers are common attack vectors mainly because they are often used in supporting the use of remote access by users and personnel (Lange, 2016). The week links which are typically used in allowing for various disastrous outcomes include the public access of company communication protocols between control centers, and corporate computer networks. Once remotely accessed, it is not only the email services, web browsers, network SCADA systems or controllers which are affected by an intrusion, every corporate device connected to the company network such as monitoring technologies are susceptible to cyber-attacks.

For illustrative purposes, the figure below indicates an example of a company network controller station configured to support remote access via WAN/LAN or dial-in modem connections over any public line of communication. Therefore, the figure illustrates the electronic access points which are prone to cyber attacks in the case of a successful data intrusion or breach on the web browsers or emails.

Figure 4: Electronic Intrusion Vulnerability Points

 

Deployment of Security Services

Some of the most common threats identified to challenge the organization’s network infrastructure include Worms/ Malware, Spoofing attacks, and Denial of Service attacks. As these challenges continue to put pressure on cybersecurity experts, several critical questions arise (Peltier, 2017). How should businesses protect themselves against such threats? what are the recommended security control strategies applicable for such instances? Which risk identification measures and mitigation strategies are best applicable to such threats?

Such measures which can be applied in securing web browsers and email services include;

  • Password masking characters should be designed not to exceed the listed minimum length so that potential network intruders are unable to limit their efforts in cracking the passwords to a known standard and length.
  • Access or intrusion warning statements should always be issued in the occurrence of an access intrusion, or unauthorized attempt.
  • Connection to the network should always be configured to be terminated upon three successive failed in an attempt to gain access to the network.
  • Even though Dial back moderns are not necessarily secure, there should be opted compared to the single answer modems.
  • Encryption protocols should be adapted on all communication platforms to secure from dial back spoofing.
  • Each level of a device or communication hierarch should implement the use of different passwords.
  • The proper implementation of Public Key infrastructure certificates to be used in enabling encryption, authentication request monitoring, and the non-repudiation of data transmission.

References

Peltier, T. R., Peltier, J., & Blackley, J. A. (2017). Managing a Network Vulnerability Assessment. CRC Press.

Lange, M., Kuhr, F., & Möller, R. (2016, August). Using a deep understanding of network activities for network vulnerability assessment. In Proceedings of the 1st International Workshop on AI for Privacy and Security (pp. 1-8).

Wang, H., Chen, Z., Zhao, J., Di, X., & Liu, D. (2018). A vulnerability assessment method in the industrial internet of things based on attack graph and maximum flow. Ieee Access6, 8599-8609.

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
error: Content is protected !!
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask