3-2 Activity Network Assessment Approach
docx
keyboard_arrow_up
School
Southern New Hampshire University *
*We aren’t endorsed by this school
Course
400
Subject
Information Systems
Date
Apr 3, 2024
Type
docx
Pages
4
Uploaded by Mngene2002
CYB 400 Security Assessment & Auditing
3-2 Activity: Network Assessment Approach
Gene Schexnayder 3/20/24
1.
Network Assessment Approach
A. Explain how you would
approach
assessing the network.
A network is used by almost every business for some part of their operations. This enables them to share information more quickly, communicate more effectively, and run more smoothly as a result. Doing a network evaluation can give you confidence about the network's health because a stable and secure network can benefit an organization in many ways. A report is used to communicate a network assessment. The network management, security, procedure, and performance of the organization's IT infrastructure are all thoroughly examined in this report. Network bench marking needs to be set up to make the most of these information. With this, businesses will be able to investigate ways to enhance under performing areas or optimize network areas as needed. The five main surveys that are looked at in a network assessment are infrastructure, performance, availability, management, and security. The initial phase of the network evaluation is the infrastructure assessment. Surveys and interviews will be undertaken to
look into the infrastructure of the office, the enterprise in question, and the corporate structure. Device, location, and user count will all be ascertained through the corporate structure survey. You'll also receive a precise list of the things for which you'll require network connectivity from this survey. After the corporate structure is obtained, a survey is conducted with the company. Included will be details about operating system systems, routing protocol architecture, and network topology. This makes certain that the technology within the company is designed to 1
meet its needs. After then, the office's constituent parts are evaluated and surveyed to examine the campus, wide-area network, software, and amenities. Finding out where to put the main offices/information and data centers, whether segregated networks are necessary to separate business divisions, and whether network access is necessary are the reasons behind the requirement to look into these organizational aspects.
B. Explain how you would account for
people, process, and technology.
The people, procedures, and technologies that make up a network can all be examined with these
surveys, and configurations can be created to carry out the best possible network design for the requirements of the company. You can make sure the evaluation satisfies the organization's requirements by following their regulations by using a network assessment checklist to help you carry it out accurately. The assessment can be carried out using a network configuration manager
application after the network is up and running. Network capacity data collection will be made possible by this application. The IT department can perform targeted network enhancements with
the information provided by this data.
C. Describe what
tools
you would use.
In order to determine who is on the network and how healthy it is, a variety of tools are required, such as vulnerability scanners that contain the most recent CVEs.
D. Explain
why
the suite of tools you identified would give you the full picture.
IT professionals and system administrators often consider a vulnerability scanner's performance and user-friendliness when selecting one. When selecting a vulnerability scanner, there are a few 2
more important factors to take into account. 1. Is its database updated on a regular basis? 2. The amount of time needed to complete vulnerability scans 3. Vulnerability scans performed automatically 4. Patch management integrated
The methods by which hackers breach an organization's IT network are simply getting more audacious. Vulnerability scanners that are capable of continuously and automatically identifying vulnerabilities ought to be installed in every organization. Whenever selecting a vulnerability scanner, make sure it meets all of your needs among the various models sold.
3
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
References
Cloudflare.
https://www.secpod.com/blog/vulnerability-scanner-the-complete-picture/
4