Project 1: Risk Management Start Here After completing your master's degree, you have been hired by a contracting company as an information systems security officer, or ISSO, supporting systems for...

1 answer below »

View more »
Answered 12 days AfterOct 13, 2021

Answer To: Project 1: Risk Management Start Here After completing your master's degree, you have been hired by...

Neha answered on Oct 26 2021
128 Votes
Running head: SECURITY ASSESSMENT REPORT                      1
SECURITY ASSESSMENT REPORT                             2
Security Assessment Report
First Name Last Name
University of Maryland University College
Security Assessment Report
This is the security assessment report for the organization. We will study about the network infrastructure and the different threats and the vulnerabilities present in the current network design. The organization has to maintain information about the doctors and patients. It is the hospital management system which will store information and process the data. I
n this report we will try to find out the network defense strategy, testing techniques, procedures and the results which can be utilized to understand the current infrastructure and how it can be modified. It also discusses about the risk and the mitigation cost. All this information can be used to understand the risk present in current network infrastructure and how they can be improved to enhance the security posture of the organization.
Security Analysis Baseline
The reason of having the risk assessment is to identify the vulnerabilities and the threads which are related with the organization of hospital management automated system. This risk assessment can be used to find out all the risk mitigation plans which are present in the hospital management system. The hospital management system was identified to have the high-risk system in the risk assessment done by the department.
It includes multiple components. The online system is the web-based application which is developed by the internal development team. The application involves Internet information server of the Microsoft and uses the active server pages.
The IT department of the organization hosts this application. The scope of this assessment is to understand different components which are included in the system except for the pay link. The in scope of the supporting system are network infrastructure and the firewalls. The web application, operating system and database are all in scope for the network risk.
Typical Attacks to Enterprise Networks
This organization is large in size and has complex structure. It relies on different connected endpoints. When we are having the good business operations and it makes the workflow for the organization easier to handle then it also creates different challenges for its security maintenance. The issue or the risk is the flexibility of the movement in the network which means that if the malicious actor is able to get access of the network then they will be free able to access network completely. These network security threads can make the organization highly exposed for the data breach.
· The unauthorized access of the system can be defined as a scenario in which attackers are able to access the network without having the permission. The reason for these types of attacks are weak passwords, previously compromised accounts, insider threads and lacking protection against the social engineering.
· We can have distributed denial of service attacks. The attackers can create botnets, or the large fleet of the compromised devices and they can be utilized to direct false traffic in the network or the server. It can take place at the network layer.
· The third one is the man in the middle attack. It involves the attackers intercepting traffic which can be between the network and the external sites. If the protocols are insecure or attackers are able to find the way to circumvent the security then they will be able to steal the data which is being transmitted, hijack the sessions or obtain the user credentials.
· There are many websites which accept input from the user and fail to validate them. The attackers are able to fill out the form and create the API call. The malicious code will be performed on the server and it will allow the attackers to get access of the system.
· Once the attackers are able to penetrate the network then they can use privilege escalation for expanding their reach. The vertical escalation will allow the attackers to get higher level of the privileges.
Network Infrastructure
The following diagram shows network infrastructure for the organization. We can see that there can be different manners in which the user will be able to enter into the system. There can be denial of service attack, insider threat or the malicious attack. It is important to check for the security of the native work at least after six months. It is important that each and every User is able to handle it and inform if they detect any type of attack on the network.
Public and Private Access Areas, web access points
The different web access points can be the router, switch or the system itself. The system has a web interface through which user can enter into the network.
Physical Hardware Components
The network includes routers and the switches. They are easy to attack, and user will be able to enter into the network. It includes the computer systems, servers, multiple routers and DHCP access point.
Operating systems, servers, network management system
    The network has Ethernet which is the most important part of the system. There can be attack on the Ethernet in which we will have packet in packet attack. In this attack the several network packets will be nested inside each other. The outer shell will have few packets and the inner ones will have malicious code or the commands. If there is any fault in the cable, then the damaged cable will suffer from the electrical interferences which can destroy the outer shell and activate the internal payloads.
Mobile and Future Applications
When we introduce the concept of bring your own device in the organization then it can create more risk to the network. The device used by the person may have virus or it can be connected with the...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here
April
January
February
March
April
May
June
July
August
September
October
November
December
2025
2025
2026
2027
SunMonTueWedThuFriSat
30
31
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
1
2
3
00:00
00:30
01:00
01:30
02:00
02:30
03:00
03:30
04:00
04:30
05:00
05:30
06:00
06:30
07:00
07:30
08:00
08:30
09:00
09:30
10:00
10:30
11:00
11:30
12:00
12:30
13:00
13:30
14:00
14:30
15:00
15:30
16:00
16:30
17:00
17:30
18:00
18:30
19:00
19:30
20:00
20:30
21:00
21:30
22:00
22:30
23:00
23:30