Description
Vulnerabilities Assessment and Recommendation Document (Parts 1-3)
You will provide a detailed vulnerabilities assessment document, along with some specific recommendations to implement to address the vulnerabilities you have described. This document should be based on the scenario provided. Use LabSim as a guide in your analysis and recommendations.
Your proposal will be submitted in three major parts:
1.Vulnerabilities Assessment
2.Network System Security Recommendations
3.Application/End-User Security Recommendations
Unformatted Attachment Preview
Purchase answer to see full attachment
Explanation & Answer
Please use this second attachment it is the best
1
Student’s Name
Professor’s Name
Vulnerabilities Assessment and Recommendation Project
Date
Vulnerabilities Assessment and Recommendation Project
Vulnerabilities Assessment
A network infrastructure contains several devices which are interconnected and designed
to transport the communications needed for applications, multimedia, data, and devices. Any
network infrastructure need to be secured and as the threat change, so should the security
strategy. Vulnerability is simply a weak spot within a network infrastructure that might be
exploited by a threat or hacks. For a very long time now, vulnerable network devices have been
the target of choice and one of the most effective techniques for hackers and the advanced threat
actors [1].Unfortunately all form of protection has little effect on today’s most notorious cyber
creatures. Below are examples of network infrastructure vulnerabilities.
USB thumb drives are the most common ways used to infect any network inside a
firewall simply because they are inexpensive, hold a lot of data, they are small and can also be
used to between multiple computers of different types. USB thumb drives are mostly used by
hackers to develop malware that automatically executes as soon as it is connected to a live USB
port. The operating System (OS) makes it worse by allowing programs to run automatically
including the malicious programs.
2
Laptops and netbooks can be a vulnerability to any network infrastructure. Laptops or
iPads are portable, discreet, include a full operating system, have an internal battery and come
with an Ethernet port for tapping into any network. A laptop, iPad or a notebook may already
have a malicious code that is running at the background and that has been tasked to scour the
network and also f...