Verified Document

Computer And Network Security Analysis

Report of The Analysis and Attack Strategy Information on the Organization

Bain & Company is a global management consultancy that has its headquarters in Boston. The company offers advice to private, public, and non-profit organizations across the world. Bain & Company advises leaders on marketing, strategy, operations, IT, and organization. Since it is a consultancy organization it has access to sensitive information from the organization that it consults for stored in its company servers. This information ranges from financial records, human resource records, the structure of the organizations, and IT systems used by the organizations. All these are valuable information and records that can be attractive to attackers. Therefore, there is a need to ensure that the information and records are stored securely and there is no possibility of an attack. Records like employee Social Security Numbers, bank information, and place of residence can be used for identity theft. Sensitive information like passwords or systems being used could be valuable as such information would make it easy for an attacker. With information regarding the systems, they can easily plot how to attack an organization by conducting their own background tests before launching the actual attack. Access credentials are also stored on the servers. The credentials would make it easy for an attack to be launched against any of the companies that Bain consults for. Employee records can also be used to impersonate a particular employee in order for the attacker to gain physical access to the organization's servers or network (Gibson, 2014). While Bain servers are relatively secure, there are some vulnerabilities that have been discovered and this makes the company vulnerable to external attacks.

In addition to the above-mentioned information, one is also able to access records pertaining to the systems being used within the organizations that Bain currently consults for. The security measures that are implemented within other organizations can also be accessed from within the organization. Bain servers also hold information regarding the network systems and this information could be vital for launching an attack. Considering that the company does IT consultancy for other organizations, it needs to understand the kind of systems that are in place within the organization in order for it to offer its services. This information will include diagrams and images that are stored within the company's servers for ease of access. However, without proper security, this information could be used by an attacker to plot or attack the organization. The security measures in place at the organizations it consults for are also stored on its servers. This information is vital to an attacker as it gives them a layout of the land before they can launch an attack. Security recommendations that have been proposed and implemented by an organization are used by the company...

This means that this information has to be stored on its servers to ensure that other employees can easily access this information. However, storing this information on its servers would mean that any attacker who gains access to Bain's servers would find a treasure trove of information.
Information Gathering Tools

TCP Port Scan with Nmap

Network ports are considered to be the entry points for a machine connected to the internet. Any service that listens to a port has the ability to receive data from a client application, process the data, and send a response back. Malicious clients have the ability to exploit vulnerabilities in the server code for them to gain access to sensitive data (Pfleeger & Pfleeger, 2012). It is also possible to execute malicious code remotely on the machine. Scanning of pots is done to determine the available network entry ports for a target machine or system. One can make use of TCP port scan to establish the ports that are open in order to launch an attack. It is also possible to determine the presence of a firewall and establish if the firewall is blocking traffic or filtering the traffic. Using TCP port scan one can also determine if a firewall has been properly configured, which would make it easy for an attack.

This tool was used to scan for vulnerable open ports in the company's network, by using their external IP address. Once the scan was complete, a list of all the available ports was provided and one could then launch a DoS attack. We then attempted to test if the target was vulnerable for a DoS attack. This would allow us to plot our plan of attack. The response of our attempt was that the target machine was vulnerable and it was possible to launch a DoS attack.

Network Vulnerability Scan with OpenVAS

OpenVAS scanner is a vulnerability assessment system that detects security issues in all manner of network devices and servers. This tool saves time from having to manually scan large networks for vulnerabilities. When listening devices are discovered they are tested for any known vulnerabilities and misconfigurations. The results are then presented in a report with detailed information about each vulnerability discovered. It is this reason that makes this tool quite effective for hackers as it can offer them information that could be vital when they are planning an attack. Since it eliminates the need for having to perform a manual analysis it makes it easy for them to scan large networks and they can get the results easily. Identifying vulnerabilities gives attackers an opportunity to determine how best they can attack an organization based on the vulnerabilities that they have discovered. Using this tool attacker are able to gauge how vulnerable a network is and they can then determine the best way to exploit these vulnerabilities.

This tool was mainly used to establish how vulnerable the network…

Sources used in this document:

References

Bejtlich, R., & Ranum, M. J. (2006). Extrusion detection: security monitoring for internal intrusions. Boston, Massachusetts: Addison-Wesley.

Gibson, D. (2014). Managing Risk in Information Systems. Burlington, Massachusetts: Jones & Bartlett Learning.

Holden, G. (2003). Guide To Firewalls and Network Security: Intrusion Detection and VPNs. Thomson-Course Technology.

Johnson, R. (2014). Security Policies and Implementation Issues. Burlington, Massachusetts: Jones & Bartlett Learning.

Kruegel, C., Valeur, F., & Vigna, G. (2004). Intrusion detection and correlation: challenges and solutions (Vol. 14). New York: Springer Science & Business Media.

Northcutt, S., Winters, S., Frederick, K., Zeltser, L., & Ritchey, R. W. (2002). Inside network perimeter security: The definitive guide to firewalls, VPNs, routers, and intrusion detection systems. Indianapolis, IN: Pearson Education.

Pfleeger, C. P., & Pfleeger, S. L. (2012). Analyzing Computer Security: A Threat/vulnerability/countermeasure Approach. Upper Saddle River, New Jersey: Prentice Hall.


Cite this Document:
Copy Bibliography Citation

Related Documents

Network Security
Words: 9364 Length: 25 Document Type: Term Paper

networking and TCP/IP and internetworking. Also discussed are risk management, network threats, firewalls, and also more special purpose network devices. The paper will provide a better insight on the general aspects of security and also get a better understanding of how to be able to reduce and manage risk personally at the workplace and at home. In today's world, the Computer has become a common feature in any organization anywhere

Network Security
Words: 1437 Length: 4 Document Type: Case Study

Network Security for a Medium Sized Company: Network security is an important component for all companies including small and medium sized firms because very few businesses can operate without a network of computers. The network of computers facilitates improved communication in order for the company to improve its profitability or productivity. However, the improved communication between computers is also associated with some inherent risks such as malware and unauthorized access. The

Network System Analysis Natividad Medical Center Was
Words: 638 Length: 2 Document Type: Essay

Network System Analysis Natividad Medical Center was established in 1844 (NMC Profile). It is a licensed hospital for 172 beds and employs approximately 800 employees. Natividad Medical Center serves more than 135,000 patients with a wide range of inpatient and outpatient services, including Doctor Clinics, surgery, lab, as well as emergency services, and handles more than 42,000 emergency visits annually. The hospital industry is governed by laws and regulations that require

Network Security
Words: 3307 Length: 10 Document Type: Research Paper

Network Security: Past, Present and Future The work of Curtin (2007) states that a network is defined as "any set of interlinking lines resembling a net, a network of roads -- an interconnected system, a network of alliances." Quite simply a computer network is a system of computers that are interconnected. There are seven layers of communication types identified by the International Standards Organization (ISO) Open Systems Interconnect (OSI) Reference Model

Proposal for a Small Business Computer Network
Words: 1646 Length: 8 Document Type: Essay

PC Selection Peripherals Networking Security Proposal for an Enterprise-Wide Solution for a Small Publishing Company Small businesses of all types and sizes require viable enterprise-wide solutions to their information technology (IT) needs. This need is especially pronounced in small businesses competing in the publishing industry where all publications are digitized and security needs are paramount. This study is in response to a request from one such publishing firm with 50 employees that requires a proposal

Gfis Authentication Technology and Network Security Issues
Words: 5811 Length: 25 Document Type: Research Paper

GFI Turn-Around IT Strategy Turn-around Information Technology Strategy for Global Finance, Inc. (GFI) GFI's Authentication Technology and Network Security Issues GFI TURN-AROUND IT STRATEGY Global Finance Inc. offers services in the finance industry. This is a sensitive area of business that requires tight security policies and strategies to be implemented on the network of such an organization. GFI has, however, not given much attention to the IT department, especially, its security and thus the

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now