ElliottBlumenstein_CST610_Project_1_SARS (2)

.docx

School

University of Maryland *

*We aren’t endorsed by this school

Course

610

Subject

Information Systems

Date

Jan 9, 2024

Type

docx

Pages

13

Uploaded by afeeblemind

CST 610 Project 1 Cyberspace and Cybersecurity Foundations Security Assessment Report Prepared By: Elliott Blumenstein Version 1.0
CST610 Page ii Table of Contents Table of Contents ....................................................................................................................... ii 1. Executive Summary .......................................................................................................... 3 2. Assessment Scope ............................................................................................................. 3 3. Assessment Methodology ................................................................................................. 3 4. Detailed Findings .............................................................................................................. 3 5. Conclusion ......................................................................................................................... 3
CST610 Page 3 1. Executive Summary FIC Bank is a small credit union looking to improve their IT infrastructure and technical risk. The company requires us to identify all available services and vulnerabilities in those services and document the findings. Within this SAR, the company will better understand its IT infrastructure and how to prevent or reduce the amount of vulnerabilities. The task was to initiate a vulnerability scan of the bank’s IP address. The scan will look for critical, high, medium, low, and information vulnerabilities. Also, I searched through Windows Powershell to learn how many ports were open, what service was using said ports, and what version was running. Using the Nessus Basic Scan, several vulnerabilities were found. The five critical and four high vulnerabilities are the most important to resolve and create a plan to reduce those kinds of vulnerabilities in the future. Six medium and one low vulnerability were detected and will be resolved. There needs to be a standard that needs to be implemented on the technical, management, and operational level. Each level must implement a plan to assist FIC Bank’s IT infrastructure. The SAR will provide details on the vulnerabilities and how to resolve them. 2. Assessment Scope The security assessment will evaluate FIC Bank’s technical infrastructure and provide recommendations to enhance and protect the technical infrastructure. The scope of this SAR will look into the hardware, software, policies on the technical infrastructure, security protocols, etc. Looking through the IP address, we can see what is open, what is closed, and how many ports there are. Also, we will see if there are any filtered ports. We can tell if a port is filtered by requesting a packet from the host but they will not respond due to the request being filtered and/or blocked by a firewall. To find out the information about the ports, we used an application to access the IP address of the
CST610 Page 4 various systems and then used Nmap commands to provide the information needed. These commands provide us with several answers. For example, Nmap 10.138.9.1/24 has 12 open ports and 988 closed ports. This gives us an indicator that IP address 10.138.9.31 has 1000 ports that are filtered. With the 12 open ports, we know there are 12 different services. We will use more commands to understand better what is on the network and our course of action. After using Powershell, the Nessus scan tool will point out any vulnerabilities, whether that is upgrading software or restricting access. Our scope is to apply what we find in each program to provide FIC Bank with a plan of action to improve its technical stature. 3. Assessment Methodology The first step was addressing FIC Bank and what they wanted from this security assessment . This will provide a base of what is needed from the assessment and what we can provide. Using what the FIC Bank wants to know, our next step is accessing the IP address of all the systems. This will entail using Nmap commands to view what ports are open, closed, and filtered. After we use the different commands, Nessus will be used to scan any vulnerabilities using the IP addresses. This scan will give us a basic understanding of where we must look and what we can recommend to the client. The scan will show the levels of vulnerabilities that we must prioritize for their system to function and protect the bank's customers from any threats. The last step is to implement a plan of action according to the management, operation, and technical aspects. Creating this will allow FIC Bank to reduce the amount of threats and limit the risk of vulnerabilities. This assessment will give FIC Bank a better understanding of what needs to be done in case of a breach.
CST610 Page 5 4. Detailed Findings Action: ipconfig Result: the IP address was provided Using ipconfig in Powershell will allow users to view your system's IP address (IPv4), 10.138.9.167. The client can use their IP address to troubleshoot network issues, trace emails or devices, or enable remote access to the network.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help