American University What Areas Are Concerning when Securing a Network.pdf
1. American University What Areas Are Concerning when Securing a
Network HW
Question DescriptionRefer to scenario for additional information.In preparation for your
network design project, discuss with your classmates ideas for addressing the security
vulnerabilities in the network design. In your discussion, address the following: What
challenges will need to be addressed with the U.S. Navy project described in your
scenario?What types of vulnerabilities need to be addressed in the design?Where might
there be points of failure in the design?What areas concern you about securing the
network?What steps would you recommend to overcome those concerns?Also respond to
the two discussion below.A few challenges that need to be addressed with the U.S. Navy is
how quickly they want this initial design to be completed. Remember we do not have our
security clearance just yet and that might hold us back in being able to handle certain
equipment and have access to certain types of data. Another issue would be how I would I
create a network design that would conform to the Navy’s Standards. And finally another
issues to be taken up is why in the first place internal network and external Department of
Defense suppliers are not “considered” secured.Vulnerabilities that should be looked at in
the design are Hardware and Software Failures and Errors, with over 260 hosts with
additional hardware of printers and base design plotters we could run into equipment that
has flaws already in them (Whittman, Mattford). These flaws could result in downtime of
equipment and failure to protect network traffic (Whittman,Mattford). Another
vulnerability to look at is the location of where this network design will implemented, will
this location be where lightning and flooding frequently take place? A concern that I had for
this project, is that I seem to be the only person with this security design, how many other
people would I would be able to speak with about this plan and are available to assist me.
Would I be able to consult with a DOD or Navy approved consultants. A suggestion I would
think to have is a security team would be a useful tool to have on standby. Another concern
that I had was what other assets I had to work with, per Eric Dosal to remedy this concern is
to conduct a review of all the assets you have “and identify all the various platforms they
run on” (Dosal).A point of failure that I worry about is the security policy with the US Navy,
depending on policy my initial design might fail altogether if that it does not comply with
DOD or Navy policies.Whitman,Mattford (2018) Principles of Information Security, Sixth
Edition. Retrieved from https://ebooksbvd.my-education-
connection.com/read/9781337470407/copyright_xhtml The most important challenge that
2. needs to be addressed with the U.S. Navy project is the level of security for all the different
hosts that will be accessing the databases. Giving each particular department the correct
clearance level, one would need to utilize the Least Privilege Principle by beginning here
with the security this sets up the system to where the clearance needs to be at (American
InterContinental University [AIU], n.d.). The other challenge will be making sure that the
people logging into the secure top-secret areas know the procedures to logging on and off
before going to the nonsecure areas of the system. Setting up the VPN so that the captain in
charge and his staff with the project have a way to securely connect from remote places that
way they are able to tunnel their activity in a more secure manner (IVPN, n.d.). The
vulnerabilities that the design will encounter would be setting the acquisition department
and the personal department up so they can access to the secure internal network and
external Department of Defense suppliers and not have access to the top-secret areas of the
system but allowing the other departments access to those areas. To negate the
vulnerabilities that will be encountered are thorough investigations into the staff that will
have access to the systems, checkpoint security stations to the work areas, and thorough
research into the system to better know what setup is already and what it is lacking. The
points of failure will more than anything else be attributed to staff error, outsiders trying to
make access to the system, and lapses of judgment by everyone involved. There need to be
ongoing training and refresher courses on security measures to keep security at the
forefront of everyone’s minds. All the areas concern me because they are all important to
the security of the facility, hopefully, I will have the know-how to combat the obstacles that
arise in the project. To overcome these concerns, I plan on doing thorough research into all
the areas and try and patch the holes in the system before someone else finds them and
trouble arises.ReferenceAmerican InterContinental University. (n.d.). Security Trends and
Concepts: Security Trends and Concepts [Multimedia presentation]. Retrieved from
American InterContinental University Virtual Campus, ITCO361-1905A-01:
https://mycampus.aiu-online.comIVPN. (n.d.) What is a VPN tunnel?. Retrieved from
https://www.ivpn.net/what-is-a-tunnelDosal, Eric (2018) 5 common Network Security
Problems and Solutions . Retrieved from https://www.compuquip.com/blog/5-common-
network-security-problems-and-solutions