D482 SECURE NETWORK 1
DESIGN
WGU D482 Secure Network Design: Performance Assessment &
Vulnerability Analysis
Secure Network Design Performance Assessment
Cybersecurity and Information Assurance, Western Governors
University D482 Secure Network Design
April 22, 2025
Business Requirements
, D482 SECURE NETWORK 2
DESIGN
Company A’s network security problems include weak passwords
and all users having administrator rights. Infrastructure problems
include open ports and the use of end-of-life equipment.
The network security problems for company B include non-
enforcement of 2FA, and the rlogin (root login) does not have a
password. Infrastructure problems include the use of an end-of-life
firewalls and the use of default configuration files on server.
Vulnerabilities
Two vulnerabilities for Company A are weak passwords (only 8
characters) and open ports. Company A’s risk analysis report shows
the risk and likelihood of both vulnerabilities as high. With little
effort a threat actor can crack weak passwords leading to access to
network resources. Similarly access to the network can be gained
through open ports with low effort.
A vulnerability for Company B is the rlogin passwordless login. The
rlogin vulnerability has a moderate risk, as it allows a threat actor to
remotely connect to a host without authentication. The impact once
connected could result in the loss of data such as credit card
numbers, social security numbers, etc. It requires low effort to exploit
making the likelihood of attack high. The use of End-of-Life Operating
Systems (EOL OS) is another vulnerability for Company B. Vendor’s
do not provide latest updates and patches for EOL OS. This makes
the risk high as there may be no or limited options for remediation if
new vulnerabilities are discovered. The use of EOL OS could impact
the company’s budget as the cost for custom solutions from the
vendor could be high.
Topology Diagram
See diagram
Topology Components
Device OSI Layer TCP/IP Layer
Servers, Laptops, Workstations 7 - Application
6 - Presentation Application
5 - Session
Firewall 4 - Transport Transport
Router, VPN 3 - Network Internet
Switch, Wireless Access Point 2 - Datalink
Cabling 1 - Physical Network
DESIGN
WGU D482 Secure Network Design: Performance Assessment &
Vulnerability Analysis
Secure Network Design Performance Assessment
Cybersecurity and Information Assurance, Western Governors
University D482 Secure Network Design
April 22, 2025
Business Requirements
, D482 SECURE NETWORK 2
DESIGN
Company A’s network security problems include weak passwords
and all users having administrator rights. Infrastructure problems
include open ports and the use of end-of-life equipment.
The network security problems for company B include non-
enforcement of 2FA, and the rlogin (root login) does not have a
password. Infrastructure problems include the use of an end-of-life
firewalls and the use of default configuration files on server.
Vulnerabilities
Two vulnerabilities for Company A are weak passwords (only 8
characters) and open ports. Company A’s risk analysis report shows
the risk and likelihood of both vulnerabilities as high. With little
effort a threat actor can crack weak passwords leading to access to
network resources. Similarly access to the network can be gained
through open ports with low effort.
A vulnerability for Company B is the rlogin passwordless login. The
rlogin vulnerability has a moderate risk, as it allows a threat actor to
remotely connect to a host without authentication. The impact once
connected could result in the loss of data such as credit card
numbers, social security numbers, etc. It requires low effort to exploit
making the likelihood of attack high. The use of End-of-Life Operating
Systems (EOL OS) is another vulnerability for Company B. Vendor’s
do not provide latest updates and patches for EOL OS. This makes
the risk high as there may be no or limited options for remediation if
new vulnerabilities are discovered. The use of EOL OS could impact
the company’s budget as the cost for custom solutions from the
vendor could be high.
Topology Diagram
See diagram
Topology Components
Device OSI Layer TCP/IP Layer
Servers, Laptops, Workstations 7 - Application
6 - Presentation Application
5 - Session
Firewall 4 - Transport Transport
Router, VPN 3 - Network Internet
Switch, Wireless Access Point 2 - Datalink
Cabling 1 - Physical Network