AllFreePapers.com - All Free Papers and Essays for All Students
Search

Csec 670 - Avisitel Simulation Round 1

Autor:   •  September 24, 2016  •  Research Paper  •  3,893 Words (16 Pages)  •  1,727 Views

Page 1 of 16

Avisitel Simulation Round 1

Norris Arceneaux

Anthony Jones

CSEC 670

University of Maryland University College


Contents

Introduction        

Role Review        

Network Administrator        

Goals and Rationale for Impact on Indexes        

Network Administrator        

Cybersecurity Administrator        

Results        

System Downtime        

Cybersecurity        

National Security        

Employee Morale, Profitability and Collaboration        

Conclusion        

Introduction

Avisitel Telecom Company has implemented a robust security policy to protect its assets from many potential threats to include the current threats of hacktivism and rootkits.  This simulation has shown how well Avisitel’s security policies have been employed to increase productivity, profits, and the national security index.  Avisitel will also endeavor to display the rationale for our decisions and set goals for future control implementations.

Role Review

Network Administrator

We received two reports of possible attack to our network.  One attack would seek to deface our company webpage, and the other attack would be the insertion of rootkits onto our network.  In response to this the network administrator increased the amount of Kerberos spending to improve authentication, enabled OS services and associated port security to harden the network (TechTarget, 2016), and enabled honeypots to try to divert any hacking attempts and gain insight on the attackers attacks methods.  Firewall restrictions were set on high to would prevent any malicious incoming traffic as well as preventing the rootkit from being able to send information out from the network if it does get compromised.  NIDS and HIDS were both decided upon to enact on our networks as this would be the most through method to discover any malicious or irregular behavior that might be an indicator or a rootkit or some other attack.  Patch management policies require that all critical and essential patches are immediately added to the network to help defend against any known weaknesses and threats.

...

Download as:   txt (24.3 Kb)   pdf (191.2 Kb)   docx (31.9 Kb)  
Continue for 15 more pages »