Verified Document

Remote Access Attacks Quick Finance Company Network Diagram Essay

Remote Access Analyze the Quick Finance Company Network Diagram and describe the assumptions you will need to make in order to identify vulnerabilities and recommend mitigation techniques as there is no further information from this company. The company does not wish to release any security related information per company policy.

The basic assumptions that must be made include: a lack of effective monitoring / coordination, the inability to deal with problems and not adapting security protocols to changing techniques. These presumptions are important, as they are showing how the firm is failing to acknowledge critical issues and develop procedures / solutions for addressing them. To mitigate these challenges, the firm must engage in a number of practices. The most notable include: training staff members about the significance of strong security procedures, enforcing password compliance, hiring an IT manager who can monitor the database for potential breaches, working with outside consultants who can test / identify vulnerabilities and actively understanding / adapting with the changing tactics utilized by hackers. These areas will enable Quick Finance to create a network diagram that is responding to potential threats and address them before a major security breach occurs. It is at this point, when their customer information will be protected from these kinds of issues in the future. (Jackson, 2010) (Pool, 2012) (Wang, 2009)

Analyze the above case and network diagram, and describe how each access point is protected or unprotected.

This is because the firm's password policy is not enforced. To make matters worse, there is no full time security professional to monitor and implement these provisions. This makes it difficult for the firm to continually update passwords and firewalls. When this happens, hackers can take advantage of these weaknesses in order to gain access to the large amounts of information inside the firm's database. (Jackson, 2010) (Pool, 2012) (Wang, 2009)
Each of these points is unprotected, by failing to update security protocols. Over the course of time, this makes them ineffective in dealing with critical challenges. Moreover, the lack of enforcing password policy makes it easy for anyone to mirror the keystrokes of employees and gain access to them. (Jackson, 2010) (Pool, 2012) (Wang, 2009)

Evaluate and describe the vulnerabilities of the Quick Finance Company's network based on the network design.

Like what was stated previously, Quick Finance's network is obsolete. This is because there is no security professional to recommend changes and upgrades to these protocols. This means that the firewall could easily be breached with hackers disabling one or a combination of them. When this happens, they have access to large amounts of information and can easily go through any database of their choosing. (Jackson, 2010) (Pool, 2012) (Wang, 2009)

Moreover, there are no procedures or systems to identify when a breach is occurring. This makes it difficult to…

Sources used in this document:
References

Jackson, C. (2010). Network Security Auditing. Indianapolis, IN: Cisco Press.

Pool, O. (2012). Network Security. New York, NY: Routledge.

Wang, J. (2009). Computer Network Security. New York, NY: Springer.
Cite this Document:
Copy Bibliography Citation

Related Documents

Gfis Authentication Technology and Network Security Issues
Words: 5811 Length: 25 Document Type: Research Paper

GFI Turn-Around IT Strategy Turn-around Information Technology Strategy for Global Finance, Inc. (GFI) GFI's Authentication Technology and Network Security Issues GFI TURN-AROUND IT STRATEGY Global Finance Inc. offers services in the finance industry. This is a sensitive area of business that requires tight security policies and strategies to be implemented on the network of such an organization. GFI has, however, not given much attention to the IT department, especially, its security and thus the

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now