Assignment 1_Security Assessment

.docx

School

University of Maryland *

*We aren’t endorsed by this school

Course

NESC506

Subject

Information Systems

Date

Jan 9, 2024

Type

docx

Pages

4

Uploaded by ChiefFlag8148

Report
Assignment 1: Security Assessment Julio C. Zafra Rojas American Public University System ISSC363 IT Security: Risk Management Nikita Black-Scott June 11, 2022
Network security is critical for organizations to protect their sensitive data, intellectual property, and other confidential information. Network security risk assessment is a comprehensive approach to identifying, evaluating, and mitigating potential risks and threats to an organization's network infrastructure. A network security risk assessment involves understanding the objectives and scope of the assessment, gathering information and data, and analyzing and evaluating potential risks and threats. In this project, I will discuss the methodology and tools required to conduct a network security risk assessment and provide recommendations for continuous monitoring and improvement. In today's digital age, organizations are continually under threat from cyber-attacks and data breaches. Conducting a network security risk assessment like footprinting and scanning helps companies to identify all the potential risks and vulnerabilities and mitigate them by putting in place adequate security controls. This not only helps protect sensitive data but also enhances the organization's overall reputation. Performing a network security assessment footprinting involves mapping out the entire network infrastructure of an organization. The goal of this is to identify potential security vulnerabilities that could be exploited by malicious attackers. To perform the footprinting effectively, I must first conduct an extensive reconnaissance of the organization's network. This reconnaissance includes gathering information regarding the IP addresses, domain names, and network architecture used by the organization. Once gathered, this information can then be used to map out the network and identify any weaknesses that could be exploited. To carry out this process, tools such as Nmap, Maltego, and Shodan can be used. These tools can scan the organization's network for open ports, services running, and other information that could be used to gain access to the network. Once this information has been collected, it can be analyzed to
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help