Final Assignment - Rosa Pereira

.docx

School

University Of Arizona *

*We aren’t endorsed by this school

Course

371

Subject

Computer Science

Date

May 1, 2024

Type

docx

Pages

12

Uploaded by LieutenantStar15454 on coursehero.com

1 Final Assignment: Risk Assessment Rosa Pereira University of Arizona NETV 371: Network Security Professor Misti Payton February 24, 2024
2 The intention of this assignment is to create a risk assessment that leads to a comprehensive examination of vulnerabilities and potential threats in a specific home network given specific network defense points, consequentially leading to a safer network given the awareness of its vulnerabilities. A network diagram will be provided, as well as the specific network defense points (such as built-in firewalls, etc.). Once the assets are identified, three of those specific key assets will be chosen to list threats, threat sources, and vulnerabilities. A comprehensive analysis will be conducted, which will give us enough information to create a risk register with specific categories, including a risk priority for each vulnerability chosen for the specific asset, this priority will be pragmatically selected; once completed, a risk treatment plan will be established. First, the creation of our home network diagram, which will take place in the logical space of Cisco’s Packet Tracer. The analysis performed will be based on the assets specific to the network provided in the following image:
3 Amongst the network defense points that cannot be visually appreciated in the diagram we have the wireless router with a built-in firewall, which helps control access to the network. The PC is configured with Windows, which means it is currently operating with the default Windows Defender Firewall with user specific settings. These settings also apply for the laptops; however, the MacBook pro has iOS specific firewall protections in place. The tablet, phones, and console directly benefit from the firewall built into the wireless router, these assets do not have intrusion detection/prevention systems, or host-based firewall tools. To perform an appropriate security assessment there is a series of steps we must follow, with the first one being the identification of all assets found within the network in the diagram provided. The assets in the network go as follows: Modem: Device which connects the entire network to the internet. Wireless Router: Device that functions as a central hub that connects all devices in the network to the internet. PC: Device connected via ethernet, main workstation in the home network. Console: Device is a gaming console connected wirelessly, primarily used for entertainment. Phones: Two mobile devices connected to the wireless network, mainly used for communication, and other applications. Tablet: Device connected wirelessly, mainly used for art, and other personal projects. Laptops: There are two of these devices connected wirelessly to the network, mainly used on the go. These assets are crucial to the network, all of them having their own specific usage, facilitating data flow and storage.
4 Continuing with our analysis, we will choose three key assets from the network and identify three risks for each of the three assets. The risks will be chosen in threats, threat sources, and vulnerabilities manner. The three specific assets chosen will be the wireless router, the main workstation (PC), and the mobile devices (phones), we will be breaking down the three risks separately for each asset chosen. Wireless Router: Threats: 1. Unauthorized access to the router’s interface. 2. Denial of Service attack. 3. Exploitation of vulnerabilities found in the firmware. Threat Sources: 1. Hackers trying to control the network. 2. Botnets. 3. Attackers looking to interrupt network services. Vulnerabilities: 1. Default (or weak) passwords. 2. Lack of appropriate security settings. 3. Unpatched firmware with existent security vulnerabilities. PC: Threats: 1. Malware infections. 2. Unauthorized access to sensitive information.
5 3. Ransomware attacks. Threat Sources: 1. Questionable websites targeting vulnerabilities in web browsers (or plugins). 2. Insider threats. 3. Phishing emails containing harmful files or links. Vulnerabilities: 1. Outdated software or operating system with known risks. 2. Weak passwords. 3. Lack of antivirus or any effective security software. Phones: Threats: 1. Mobile malware aiming to affect the device. 2. Unauthorized access to private data stored on the device. 3. Wi-Fi or Bluetooth attacks abusing weaknesses in wireless communications protocols. Threat Sources: 1. Fraudulent applications downloaded from untrusted sources (unofficial stores or websites). 2. Misplacement of the device, or stolen device. 3. Wireless networks set up by individuals with malicious intent to catch private data. Vulnerabilities: 1. Overdue security updates.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help