Mod 3 Activity Blackstone

docx

School

Southern New Hampshire University *

*We aren’t endorsed by this school

Course

400

Subject

Information Systems

Date

Apr 3, 2024

Type

docx

Pages

2

Uploaded by ABusch18

Report
The approach to the network assessment is vital as it sets the plan into action. I would approach the assessment by identifying the parts of the network itself. Making sure the network map is up to date by identifying the hosts, segmented networks and users and updating the map and our plan accordingly. I would also make sure that we have all the necessary tools available to be used. Scanning for vulnerabilities would be included in the approach so that we know where to focus our energy. Utilizing Nmap to scan the network provides us with information for the technology on the network, such as firewalls, printers and scanners. Being able to identify every piece of equipment on the network is vital to assessing it. The people involved in the network are a major source of weakness in the security of our network and, therefore, must be considered. We will need to establish which workstations are utilized by which users and where they are connected into the network itself. This way if vulnerabilities are found around a specific workstation, we can narrow down the potential source of the vulnerability. This would also be a good time to push a forced password update on users to ensure that their details are up to date and following current policy. I would also use this time to make sure that our policies are updated and appropriate for the current state of the network. The tools utilized wouldn’t vary much from what most analysts are familiar with. Nmap, of course is an industry standard. OpenVAS is also considered a standard in cyber security. Both of these tools are vulnerability scanners and are essential to protecting a network. I would also like to utilize Frontline VM. It is a network vulnerability scanner that also scans web application scanning and vulnerability management. ( Top 14 Vulnerability Scanners for Cybersecurity Professionals | Core Security Blog , 2024) Wireshark is another industry standard for analyzing network protocol and should be considered during any assessment. Another tool that might be
overlooked is the topology map of the network. It is an important thing to be able to refer to during any assessment of the network. I would utilize these tools because they are industry standards for a reason. They are tried and true and proven to be effective at their respective jobs. Frontline Vulnerability Manager will help scan our cloud based systems and it also offers penetration testing. Nmap can take inventory of the network and establish which firewalls are in use. ( Chapter 15. Nmap Reference Guide | Nmap Network Scanning , 2024) OpenVAS can scan for vulnerabilities and visible ports. It can also scan for known exploits and offer recommendations on fixing them. By utilizing all these tools, we will be well equipped to find the vulnerabilities that are present in the network and also be able to fix them so that they are no longer a concern. As data is collected, a report should be written up and any vulnerabilities either fixed or noted for future investigation. References: Chapter 15. Nmap Reference Guide | Nmap Network Scanning . (2024). Nmap.org. https://nmap.org/book/man.html#man-description Top 14 Vulnerability Scanners for Cybersecurity Professionals | Core Security Blog . (2024). Coresecurity.com. https://www.coresecurity.com/blog/top-14-vulnerability-scanners- cybersecurity-professionals
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help