Verified Document

Remote Access Attacks Quick Finance Company Network Diagram Essay

Remote Access Analyze the Quick Finance Company Network Diagram and describe the assumptions you will need to make in order to identify vulnerabilities and recommend mitigation techniques as there is no further information from this company. The company does not wish to release any security related information per company policy.

The basic assumptions that must be made include: a lack of effective monitoring / coordination, the inability to deal with problems and not adapting security protocols to changing techniques. These presumptions are important, as they are showing how the firm is failing to acknowledge critical issues and develop procedures / solutions for addressing them. To mitigate these challenges, the firm must engage in a number of practices. The most notable include: training staff members about the significance of strong security procedures, enforcing password compliance, hiring an IT manager who can monitor the database for potential breaches, working with outside consultants who can test / identify vulnerabilities and actively understanding / adapting with the changing tactics utilized by hackers. These areas will enable Quick Finance to create a network diagram that is responding to potential threats and address them before a major security breach occurs. It is at this point, when their customer information will be protected from these kinds of issues in the future. (Jackson, 2010) (Pool, 2012) (Wang, 2009)

Analyze the above case and network diagram, and describe how each access point is protected or unprotected.

Parts of this document are hidden

View Full Document
svg-one

This is because the firm's password policy is not enforced. To make matters worse, there is no full time security professional to monitor and implement these provisions. This makes it difficult for the firm to continually update passwords and firewalls. When this happens, hackers can take advantage of these weaknesses in order to gain access to the large amounts of information inside the firm's database. (Jackson, 2010) (Pool, 2012) (Wang, 2009)
Each of these points is unprotected, by failing to update security protocols. Over the course of time, this makes them ineffective in dealing with critical challenges. Moreover, the lack of enforcing password policy makes it easy for anyone to mirror the keystrokes of employees and gain access to them. (Jackson, 2010) (Pool, 2012) (Wang, 2009)

Evaluate and describe the vulnerabilities of the Quick Finance Company's network based on the network design.

Like what was stated previously, Quick Finance's network is obsolete. This is because there is no security professional to recommend changes and upgrades to these protocols. This means that the firewall could easily be breached with hackers disabling one or a combination of them. When this happens, they have access to large amounts of information and can easily go through any database of their choosing. (Jackson, 2010) (Pool, 2012) (Wang, 2009)

Moreover, there are no procedures or systems to identify when a breach is occurring. This makes it difficult to…

Sources used in this document:
References

Jackson, C. (2010). Network Security Auditing. Indianapolis, IN: Cisco Press.

Pool, O. (2012). Network Security. New York, NY: Routledge.

Wang, J. (2009). Computer Network Security. New York, NY: Springer.
Cite this Document:
Copy Bibliography Citation

Related Documents

Attacks on Pearl Harbor and the World
Words: 8509 Length: 27 Document Type: Term Paper

Attacks on Pearl Harbor and the World Trade Center had similar historical events surrounding each attack. Franklin Delano Roosevelt and George W. Bush used similar policies to combat further attacks and unite the nation The paper highlights the entwined American reactions to the September 11 attacks and the Pearl Harbor attacks. The paper illustrates the similarities in which the over-prevailing backgrounds of each event created reactions to the devastating measures that

Attack on Pearl Harbor Lessons
Words: 973 Length: 3 Document Type: Essay

Yamamoto noted that "the war would continue for several years, our supplies would be exhausted, our ships and arms would be damaged and ultimately we would not be able to escape defeat." (Akira, 1990, pp.133-134). Masaru (1990) added that another difficulty between the two nations was America's attitude during the U.S.-Japanese negotiations on the eve of the outbreak of war. In particular, Masaru points to the hard line position of

Attack of the Butterflies Mark
Words: 1763 Length: 5 Document Type: Essay

The trick is not to focus on any of this, but to focus on preparation and then on the real thing. Do you think you're afraid to talk in front of other people? Guess what? The average person says 15,000 words per day. Unless you're in solitary confinement, those words are spoken to other people, sometimes two, three or more at the same time. You speak to family, friends, fellow

Attack in 2001 Was in
Words: 3433 Length: 10 Document Type: Term Paper

Such an attitude is part cultural clash and part resp0onse to external events, but it fosters a way of thinking that only leads to more conflict over time. U.S. support for Israel is often cited as the key element in explaining Islamic hatred of America, but that is only one element. The way the U.S. fails to understand Islam is another element that creates tension. Also, actions such as those

Attack of 911 Has Posed a Serious
Words: 4017 Length: 10 Document Type: Term Paper

attack of 911 has posed a serious threat to the aviation industry. For the first the world could realize that airplanes are not only the mode of transportation but can also be utilized as potential bombs. Many passengers are apprehensive of air travel. This led Governments, Policy Makers, aviation industries and regulatory authorities to think a while about aviation security. The aviation security is being revolutionized since then to

Attack Causality in Internet-Connected Cellular Networks, Internet...
Words: 796 Length: 2 Document Type: Essay

Attack Causality in Internet-Connected Cellular Networks," internet infrastructure security researchers Patrick Traynor, Patrick McDaniel and Thomas La Porta address the convergence of telecommunication and internet networks, and "how the architecture of cellular networks makes these systems susceptible to denial of service attacks" (2007). Rather than attribute the threat posed by denial of service attacks to the oft cited cause of limited bandwidth capability, the authors contend that telecommunication and

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now