100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4.2 TrustPilot
logo-home
Otro

D482 Secure Network Design

Puntuación
-
Vendido
-
Páginas
16
Subido en
25-06-2025
Escrito en
2024/2025

This document provides a comprehensive secure network design plan for two companies undergoing a merger, as part of coursework for D482 – Secure Network Design. It begins with an in-depth assessment of current network vulnerabilities, including open ports, use of Remote Desktop Protocol (RDP), weak password policies, outdated equipment, and the lack of Multi-Factor Authentication (MFA). The document analyzes these issues and proposes a redesigned network topology that incorporates security best practices such as Zero Trust Architecture and Defense-in-Depth. Each network component is mapped to the OSI and TCP/IP layers, and the design aligns with regulatory compliance requirements, including PCI DSS for financial data and HIPAA for healthcare data. The plan also addresses emerging cybersecurity threats like Advanced Persistent Threats (APTs), Zero-Day Exploits, and IoT vulnerabilities. A cost-benefit analysis supports a hybrid infrastructure model, combining on-premises and cloud-based solutions to optimize performance, scalability, and security while staying within a $50,000 budget. This document is ideal for students looking to understand practical applications of secure network design in real-world scenarios, particularly in mergers involving regulatory-sensitive industries.

Mostrar más Leer menos
Institución
Grado










Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
Grado

Información del documento

Subido en
25 de junio de 2025
Número de páginas
16
Escrito en
2024/2025
Tipo
Otro
Personaje
Desconocido

Temas

Vista previa del contenido

1




Complexities of Counterterrorism through Government Efficiency and Resilience

Student's Name

University

Course

Professor

Date

, 2


Complexities of Counterterrorism through Government Efficiency and Resilience

Question A: Describe two current network security problems for each company, based on

business requirements given in the scenario

For Company A, one current network security problem is the presence of open ports (21-

90, 3389) and the use of Remote Desktop Protocol (RDP) for remote desktop access. This poses

a high-risk vulnerability, especially considering the financial industry's sensitivity to data

confidentiality and integrity. Another concern is the use of eight-character passwords by all

users, which is also a high-risk issue. This weak password policy could potentially lead to

unauthorized access and compromise the confidentiality and integrity of customer and employee

Personally Identifiable Information (PII). Additionally, the persistence of user accounts that are

no longer required presents a moderate-risk problem, as it increases the attack surface and

potential for unauthorized access.

For Company B, a significant security issue is the lack of Multi-Factor Authentication

(MFA) enforcement for all users. Given the nature of Company B's operations, which involve

specialized software for medical providers and credit card transactions, MFA becomes crucial

for securing access and preventing unauthorized entry. Another concern is the presence of

critical vulnerabilities in the servers, such as the Distributed Ruby (dRuby/DRb) Multiple

Remote Code Execution Vulnerabilities and the Java RMI Server Insecure Default Configuration

Remote Code Execution Vulnerability. These vulnerabilities pose a high risk to the

confidentiality, integrity, and availability of sensitive data, and addressing them is imperative for

network security. Additionally, the existence of weak passwords in the PostgreSQL database and

the accessibility of PostgreSQL admin from the internet pose further risks to data integrity and

confidentiality.

, 3


Another security problem for company A is the use of outdated and end-of-life

equipment, as identified in the risk analysis. This low-risk issue could still pose a threat to the

availability and reliability of the network, especially in a financial industry setting where system

uptime is critical. The presence of end-of-life equipment may lead to increased vulnerability to

exploits and limited support for security updates, potentially impacting the company's

operational continuity. As for Company B, the lack of enforcement of Multi-Factor

Authentication (MFA) across all users is a critical security concern. Given that Company B deals

with specialized software for medical providers and handles credit card transactions, ensuring

robust authentication mechanisms is vital for protecting sensitive information. The absence of

MFA increases the risk of unauthorized access and potential data breaches. Additionally, the use

of deprecated and weak cryptographic protocols, as highlighted in the vulnerability assessment,

such as SSLv2 and SSLv3, poses a moderate-risk problem. This could expose the network to

security vulnerabilities, potentially compromising the confidentiality and integrity of data,

especially considering the sensitive nature of medical and financial information.

Question B: Analyse the given network diagram and vulnerability scan for both companies

by doing the following:

1. Describe the two existing vulnerabilities for each company

For Company A, two existing vulnerabilities are evident from the network diagram and

vulnerability scan. Firstly, the presence of Remote Desktop Protocol (RDP) for remote desktop

access poses a significant vulnerability. If not properly secured, RDP can be exploited by

attackers to gain unauthorized access, potentially leading to the compromise of sensitive

financial data. Secondly, the use of open ports (21-90, 3389) introduces a vulnerability,

particularly considering the financial industry's strict security requirements. These open ports
$14.49
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor
Seller avatar
dorianstanfield

Conoce al vendedor

Seller avatar
dorianstanfield Western Governers University
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
3
Miembro desde
1 año
Número de seguidores
0
Documentos
4
Última venta
3 meses hace

0.0

0 reseñas

5
0
4
0
3
0
2
0
1
0

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes