Assignment 1_Security Assessment
.docx
keyboard_arrow_up
School
University of Maryland *
*We aren’t endorsed by this school
Course
NESC506
Subject
Information Systems
Date
Jan 9, 2024
Type
docx
Pages
4
Uploaded by ChiefFlag8148
Assignment 1: Security Assessment
Julio C. Zafra Rojas
American Public University System
ISSC363 IT Security: Risk Management
Nikita Black-Scott
June 11, 2022
Network security is critical for organizations to protect their sensitive data, intellectual property,
and other confidential information. Network security risk assessment is a comprehensive approach to identifying, evaluating, and mitigating potential risks and threats to an organization's network infrastructure. A network security risk assessment involves understanding the objectives and scope of the assessment, gathering information and data, and analyzing and evaluating potential risks and threats. In this project, I will discuss the methodology and tools required to conduct a network security risk assessment and provide recommendations for continuous monitoring and improvement.
In today's digital age, organizations are continually under threat from cyber-attacks and data breaches. Conducting a network security risk assessment like footprinting and scanning helps companies
to identify all the potential risks and vulnerabilities and mitigate them by putting in place adequate security controls. This not only helps protect sensitive data but also enhances the organization's overall reputation.
Performing a network security assessment footprinting involves mapping out the entire network
infrastructure of an organization. The goal of this is to identify potential security vulnerabilities that could be exploited by malicious attackers. To perform the footprinting effectively, I must first conduct an
extensive reconnaissance of the organization's network. This reconnaissance includes gathering information regarding the IP addresses, domain names, and network architecture used by the organization. Once gathered, this information can then be used to map out the network and identify any
weaknesses that could be exploited.
To carry out this process, tools such as Nmap, Maltego, and Shodan can be used. These tools can
scan the organization's network for open ports, services running, and other information that could be used to gain access to the network. Once this information has been collected, it can be analyzed to
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help