Csec 670 - Avisitel Simulation Round 1
Autor: Anthony Jones • September 24, 2016 • Research Paper • 3,893 Words (16 Pages) • 1,739 Views
Avisitel Simulation Round 1
Norris Arceneaux
Anthony Jones
CSEC 670
University of Maryland University College
Contents
Introduction
Role Review
Network Administrator
Goals and Rationale for Impact on Indexes
Network Administrator
Cybersecurity Administrator
Results
System Downtime
Cybersecurity
National Security
Employee Morale, Profitability and Collaboration
Conclusion
Introduction
Avisitel Telecom Company has implemented a robust security policy to protect its assets from many potential threats to include the current threats of hacktivism and rootkits. This simulation has shown how well Avisitel’s security policies have been employed to increase productivity, profits, and the national security index. Avisitel will also endeavor to display the rationale for our decisions and set goals for future control implementations.
Role Review
Network Administrator
We received two reports of possible attack to our network. One attack would seek to deface our company webpage, and the other attack would be the insertion of rootkits onto our network. In response to this the network administrator increased the amount of Kerberos spending to improve authentication, enabled OS services and associated port security to harden the network (TechTarget, 2016), and enabled honeypots to try to divert any hacking attempts and gain insight on the attackers attacks methods. Firewall restrictions were set on high to would prevent any malicious incoming traffic as well as preventing the rootkit from being able to send information out from the network if it does get compromised. NIDS and HIDS were both decided upon to enact on our networks as this would be the most through method to discover any malicious or irregular behavior that might be an indicator or a rootkit or some other attack. Patch management policies require that all critical and essential patches are immediately added to the network to help defend against any known weaknesses and threats.
...