100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Other

D482 Secure Network Design

Rating
-
Sold
-
Pages
16
Uploaded on
25-06-2025
Written in
2024/2025

This document provides a comprehensive secure network design plan for two companies undergoing a merger, as part of coursework for D482 – Secure Network Design. It begins with an in-depth assessment of current network vulnerabilities, including open ports, use of Remote Desktop Protocol (RDP), weak password policies, outdated equipment, and the lack of Multi-Factor Authentication (MFA). The document analyzes these issues and proposes a redesigned network topology that incorporates security best practices such as Zero Trust Architecture and Defense-in-Depth. Each network component is mapped to the OSI and TCP/IP layers, and the design aligns with regulatory compliance requirements, including PCI DSS for financial data and HIPAA for healthcare data. The plan also addresses emerging cybersecurity threats like Advanced Persistent Threats (APTs), Zero-Day Exploits, and IoT vulnerabilities. A cost-benefit analysis supports a hybrid infrastructure model, combining on-premises and cloud-based solutions to optimize performance, scalability, and security while staying within a $50,000 budget. This document is ideal for students looking to understand practical applications of secure network design in real-world scenarios, particularly in mergers involving regulatory-sensitive industries.

Show more Read less










Whoops! We can’t load your doc right now. Try again or contact support.

Document information

Uploaded on
June 25, 2025
Number of pages
16
Written in
2024/2025
Type
Other
Person
Unknown

Subjects

Content preview

1




Complexities of Counterterrorism through Government Efficiency and Resilience

Student's Name

University

Course

Professor

Date

, 2


Complexities of Counterterrorism through Government Efficiency and Resilience

Question A: Describe two current network security problems for each company, based on

business requirements given in the scenario

For Company A, one current network security problem is the presence of open ports (21-

90, 3389) and the use of Remote Desktop Protocol (RDP) for remote desktop access. This poses

a high-risk vulnerability, especially considering the financial industry's sensitivity to data

confidentiality and integrity. Another concern is the use of eight-character passwords by all

users, which is also a high-risk issue. This weak password policy could potentially lead to

unauthorized access and compromise the confidentiality and integrity of customer and employee

Personally Identifiable Information (PII). Additionally, the persistence of user accounts that are

no longer required presents a moderate-risk problem, as it increases the attack surface and

potential for unauthorized access.

For Company B, a significant security issue is the lack of Multi-Factor Authentication

(MFA) enforcement for all users. Given the nature of Company B's operations, which involve

specialized software for medical providers and credit card transactions, MFA becomes crucial

for securing access and preventing unauthorized entry. Another concern is the presence of

critical vulnerabilities in the servers, such as the Distributed Ruby (dRuby/DRb) Multiple

Remote Code Execution Vulnerabilities and the Java RMI Server Insecure Default Configuration

Remote Code Execution Vulnerability. These vulnerabilities pose a high risk to the

confidentiality, integrity, and availability of sensitive data, and addressing them is imperative for

network security. Additionally, the existence of weak passwords in the PostgreSQL database and

the accessibility of PostgreSQL admin from the internet pose further risks to data integrity and

confidentiality.

, 3


Another security problem for company A is the use of outdated and end-of-life

equipment, as identified in the risk analysis. This low-risk issue could still pose a threat to the

availability and reliability of the network, especially in a financial industry setting where system

uptime is critical. The presence of end-of-life equipment may lead to increased vulnerability to

exploits and limited support for security updates, potentially impacting the company's

operational continuity. As for Company B, the lack of enforcement of Multi-Factor

Authentication (MFA) across all users is a critical security concern. Given that Company B deals

with specialized software for medical providers and handles credit card transactions, ensuring

robust authentication mechanisms is vital for protecting sensitive information. The absence of

MFA increases the risk of unauthorized access and potential data breaches. Additionally, the use

of deprecated and weak cryptographic protocols, as highlighted in the vulnerability assessment,

such as SSLv2 and SSLv3, poses a moderate-risk problem. This could expose the network to

security vulnerabilities, potentially compromising the confidentiality and integrity of data,

especially considering the sensitive nature of medical and financial information.

Question B: Analyse the given network diagram and vulnerability scan for both companies

by doing the following:

1. Describe the two existing vulnerabilities for each company

For Company A, two existing vulnerabilities are evident from the network diagram and

vulnerability scan. Firstly, the presence of Remote Desktop Protocol (RDP) for remote desktop

access poses a significant vulnerability. If not properly secured, RDP can be exploited by

attackers to gain unauthorized access, potentially leading to the compromise of sensitive

financial data. Secondly, the use of open ports (21-90, 3389) introduces a vulnerability,

particularly considering the financial industry's strict security requirements. These open ports
$14.49
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
dorianstanfield

Get to know the seller

Seller avatar
dorianstanfield Western Governers University
View profile
Follow You need to be logged in order to follow users or courses
Sold
3
Member since
1 year
Number of followers
0
Documents
4
Last sold
3 months ago

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions