Technical Paper
Strayer University
CIS 502
December 15, 2013
Risk Assessment
Describe the company network, interconnection, and communication environment. In order to support their growing business, Global Finance, Inc. (GFI) has taken necessary actions to ensure their network remains fault tolerant and resilient from any network failures. GFI has acquired network devices in order to support their network and maintain interconnection among their employees and customers.
The World Trade Organization defines interconnection as:
“Linking with suppliers providing public telecommunications transport networks or services in order to allow the users of one supplier to communicate with users of another …show more content…
(Beaver, 2013)
• Network Security Omission #2: Weak or default passwords—many web applications, content management systems, and even database servers are still configured with weak or default passwords. Who would need file inclusion or SQL injection when the file system or database can be accessed directly?
Solution: Change and test for weak passwords regularly and consider using a password management tool. Implement intruder lockout after a defined number of failed login attempts. (Beaver, 2013)
• Network Security Omission #3: Misconfigured firewall rulebases—One of the biggest, most dangerous, assumptions is that everything is well in the firewall because it’s been working fine. Digging into a firewall rulebase that has never been analyzed will inevitably turn up serious configuration weaknesses that allow for unauthorized access into the web environment. Sometimes it’s direct access while other times it’s indirect from other network segments including Wi-Fi – parts of the network that may have been long forgotten.
Solution: Start with the organization’s security policy; one that reflects the current situation and foreseeable business requirements. After all, the firewall rulebase is the technical implementation of this security policy. Review it regularly and keep it relevant. (Beaver, 2013)
• Network Security Omission #4: Mobile devices—Phones, tablets, and unencrypted laptops pose some of the