preview

Internet Security Problems: The Case of Penzil Vintage Autoparts

Decent Essays

Summary
Penzil Vintage Autoparts supplies automotive parts to mechanics, dealers and lately to the mining industry. There are 4 offices and 1 warehouse from where all stock is sourced. Currently the inventory system located at the warehouse is accessed on expensive fixed 512Kbit lines. They are geographically spread out as per this map (Not to Scale). These are in Hillarys, Osborne Park (being the main warehouse), Alexander Heights, Kewdale and Melville. Penzil Vintage Autoparts has recently had some issues and you have been assigned by your boss to assess and report on resolution strategies for the customer.

The 4 stores generate a base turnover of $100 million per year with 150 employees. Over 50% of business revenue is from credit …show more content…

Police have been unable to respond or provide any detail. The person supporting the issue with the SQL inventory system has been unable to provide any data to explain the shipping errors. The account passwords and other traces of the old IT administrator have been cleansed from the system.

Current Wireless Installation Details

• All sites are using 16Dbi omni-directional antennae’s on 16 meter towers with 2 Watt injectors that connect to 200mw APs (Linksys WRT54G)
• The APs in the store are a mix of Cisco 1200 series APs
• Managerial AP is Cisco 1200 series at 100mW
• Inventory AP is Netgear WG602 at 100mW with 6dBi antenna
• Wireless cards are a mix of 802.11b and g cards from Netgear, Proxim and DLink
• There are some wireless tills
• WEP Encryption is being used
• SSID is Penzil Vintage Autoparts and is broadcasting
• No Firewall, VPN or other countermeasure except virus protection
• All Infrastructure is running on 172.16.0.0/16 network

Network Analysis and Vulnerabilities
Here we will analyze each component of installation, and will discuss risk, countermeasures, update of hardware or software individually .By analyzing the above network , there were lot of vulnerabilities . The network contains many loop holes which are to be considered and should be updated wherever necessary. There are lot of vulnerabilities which are hidden and not known to users and company

Get Access