Management is pleased with the progress that has been made and likes the steps y
ID: 3745490 • Letter: M
Question
Management is pleased with the progress that has been made and likes the steps you have taken to set up a secured network environment. During the last status meeting, it was asked, has everything been done that is possible to ensure the security of the environment? Your response was that you believed it has, but one way to be sure is to conduct a vulnerability assessment and a penetration test. Create a PowerPoint presentation of 6-8 slides that includes lecture notes and a references slide. It must cover the following: Describe at least two common security threats against wired and wireless devices and typical countermeasures used by corporate security teams Describe at least two Identity & Access Management tools needed to measure and monitor security risks across the enterprise. Explanation about penetration testing and vulnerability assessments regarding how they differ. Identify the benefits of using penetration testing and vulnerability assessments relative to threats. Discuss the tools available in the industry (at least 5 different tools should be discussed) and explain how they can be used to mitigate security vulnerabilities.
Explanation / Answer
Answer)
Some of the security threats of wireless LAN are as follows:
1) Denial of Service: The attacks flood the network with its messages which might be valid or invalid which will help to make the bit rate of WLAN low and bulnerable to attack.
2) Spooling and session hijacking: Attacker gains access to priviledged data and resources in the given network by fetching the identity of the user.
3) Eavesdropping: The confidential information gets transmitted across network.
Some of the solution to protect the WLAN are as follows:
Changing the default SSID, Utilizing the VPN, Utilizing the static IP, Access point placement, Minimizing the radio wave propagation in non-user areas.
Some of the new standards have also been implemented like 802.1x, 802.11i etc
Tools that help to protect are : AirDefense, Isomair wireless Security, Wireless Security Auditor (WSA)
Some of the security threats of wired network are as follows:
1) Firewall protection,
2) Employees error
3) BYOD Security threats
All the above security threats can be solved by implementing the firewall protection, antivirus and limitations for usage by the employees and users.
Two such tools are as follows:
1) RSA
2) Oracle
The difference between a vulnerability test and penetration testing are as follows:
Penetration testing is done to exploit the weakness in a system. This needs various levels of expertise to be performed.
Vulnerability scanning is automated and is meant for scanning any such vulnerabilities.
The benefits of using such scanning and tests are to prevent the system from vulnerabilities and bugs or system breakdowns. Also they give a detailed statement of what all is the risk and flaws in the system.
Some of the tools are: OpenVAS, Samurai framework, Safe3 Scanner, Nmap, AirCracker etc.
Hit like if you find the answer useful.
Hope this answer helps. :) Happy to help.
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.