SlideShare a Scribd company logo
1 of 11
Riordan Network Vulnerabilities
Vulnerability
Threat
Probability
Impact
Suggested Mitigation Steps
1
USB DRIVE
The most common way to infect a network from inside a
firewall
Implement and enforce policies regarding use of such devices.
2
LAPTOP
Can tap directly into the network and infect with malware
allowing others access
Implement and enforce policies regarding portable devices.
3
BLUETOOTH
Identity detection, DOS,
involuntary control and access of data
Implement and enforce policies regarding use of such devices.
4
WI-FI
Clear text data can be captured
Implement and enforce policies regarding use of such devices.
5
FIREWALL
Protects content on desktops and in turn keeps entire network
safe
Install and configure firewalls
6
NETWORK PROTOCOLS
Flawed unpatched protocols can cause remote sabotage and
DOS
Disable unused protocols and monitor ones being used.
7
SMARTPHONES
Potentially pose the same threats as notebooks and thumb drives
Implement and enforce policies regarding use of such devices.
8
OPTICAL MEDIA
Being able to steal and leaking confidential data
Implement and enforce policies regarding access and use of
recordable media.
9
ROUTERS
Exposed ports, Network access
Install and configure routers based on industry standards
10
NETWORK CABLES
Reduce the danger of electronic interference or loss of network
connectivity
Install cable in areas to minimize interference. Label cables.
11
PRINTERS
While the print task is in the queue, the data is unencrypted and
vulnerable to theft
Update printer firmware and keep an update inventory of all
printers and drivers
12
FAX MACHINES
Unsecure faxing will put you at risk for confidential and
identity theft
Implement and enforce policies regarding information
distribution
13
SAN STORAGE
Network availability
Limit access to data storage based on classification and need to
know.
14
EMPLOYEES
Individuals having access to restricted area of the network
Maintain a strict access control policy for restricted areas.
15
SERVERS
Open to brute force attacks, botnets, cross-site scripting and
DOS
Harden servers against cyber attacks using industry standard or
better.
16
WORKSTATIONS
Can be used by attackers as "slave" machines in coordinated
attacks.
Harden workstations against cyber attacks using industry
standard or better.
17
VIDEO CONFRENCING
Machines set to auto answer will allow the attacker to
essentially gain a front-row seat inside corporate meetings
Should be hardened disable auto answer to prevent eaves
dropping.
18
THEFT
Attacker steals privilege information to gain access
Access control and password policy
19
IMPERSONATION
Attacker poses as a service provider or custodial crew to
physically gain access
Security awareness training and policy
20
LAPTOPS/TABLETS
Portable and easy to hide and attach to network.
Implement and enforce portable device policy
21
USB DEVICES
MP3 Players, etc
Implement strict policies regarding USB devices.
22
FIRE ALARM
Fire retardant system does not work when needed
Test fire alarm system periodically
23
ELECTRICAL POWER
No backup power in case of public power outage
Backup generators and UPS for critical systems
24
AIR CONDITION SYSTEM
Cooling system fail causing equipment to overheat and fail
Service and maintain heating and cooling system.
25
POOR MAINTENANCE
Do not know when unauthorized equipment is attached to the
network
Inventory and label all equipment and document change
management
Logical Network Vulnerabilities
1
DATABASE
SQL Injection, DOS Attacks, Database Exposure and Privilege
elevation
2
VPN
Confidential information can be inadvertently downloaded.
Unobstructed route for Malware.
3
MAN-IN-THE-MIDDLE
Attacker monitors and steals
Information in real time
Use cryptography and Hashed Message Authentication Codes
4
PRIVILEGE ESCALATION
Individual gains access to
network higher functions due to misconfiguration
Check Roles, Use strong ACLs; and use standard encryption
5
PHISHING
Used by an attacker to collect sensitive information to gain
access
Segment network and encrypt data
6
FOOTPRINTING
Attacker use default username and weak or blank password to
gain access to the network
Strong password, do not use blank password or weak
7
HIJACKING
Attacker can take over your internet browser downloading
additional malware
Use session and communication encryption. Apply patch to fix
vulnerabilities
8
SOCIAL ENGINEERING
Attackers will trick users into revealing their passwords
Security awareness training.
9
PASSWORDS
Easy guessable passwords, hackers gain initial access to a
system.
Enforce strong password; lock out and audit trails
10
DIGITIAL CERTIFICATE
Attackers hack into certificate authorities and issue false
certificates for legitimate websites
Revoke PKI and maintain list of revoked keys to id false
certificates.
11
OPERATING SYSTEM
If not patched regularly the network is open to security
vulnerabilities
Harden OS
12
TCP/IP
Vulnerable to a variety of attacks ranging from password
sniffing to denial of service
Disable unnecessary protocols
13
EMAIL
Spyware, Virus, Phishing, and spam
Conduct cyber security awareness to educate end user of email
threats.
14
WEB BROWSERS
Attacker can take over your browser making you vulnerable if
the browser plug-ins are not fully patched
Configure secure web permissions; Use .Net Framework access
control
15
INSTANT MESSAGING
Vulnerable to firewall tunneling, identity theft, data security
leaks, and authentication spoofing
Strong password, do not cache password,
16
SECURITY MISCONFIG
Attackers can access networks virtually without attracting
attention
Configure based on industry standard. Avoid custom
configuration
17
WEB APPLICATIONS
DOS, Elevation of privilege, Information disclosure, and
impersonation
Input validation
Use HTMLEncode and URLEncode functions to encode any
output
18
MALWARE
Can infect networked resources and possibly bring down the
network
Update definition files and patches.
19
SOFTWARE DEFECT
Allows data to be viewed by unauthorized people
Apply updates and patch vulnerabilities. Or uninstall and
replace.
20
SPOOFING
An attacker pretends to be an entity to take over communication
between systems
Strong authentication.
Do not store secrets Do not pass credentials in plaintext over
the wire.
Protect authentication cookies with SSL.
21
DOS ATTACK
An attack on a network that causes a loss of service to users
Resource and bandwidth throttling techniques.
Validate and filter input.
22
SNIFFER ATTACK
Can read, monitor, and capture network data exchanges
Segment network. Encrypt data.
23
BUFFER OVERFLOW
Exploits poorly written software to allow attackers to take over
the target system
Validate input
Inspect API managed code.
Use the /GS flag to compile code
24
REMOTE ACCESS
Without the appropriate security measures (SSL VPN), all
communications are being transmitted in clear text
Configure remote access with the necessary security parameters
to ensure secure communication.
25
NO ANTIVIRUS
Not Protected against virus and other malware attacks
Install, configure and update antivirus software.
3
Created a table of 50 vulnerabilities and threat pairs relevant to
the organization
0.00
0.70
0.85
1.00
0.85
Comment: Trying to find 50 vulnerabilities is not an easy task.
Not every item is a vulnerability. Some are attacks, some are
threats, and some are vulnerabilities.

More Related Content

Similar to Riordan Network VulnerabilitiesVulnerabilityThreatProbabil.docx

Ethical hacking
Ethical hackingEthical hacking
Ethical hackingAnumadil1
 
Security Operation Center Fundamental
Security Operation Center FundamentalSecurity Operation Center Fundamental
Security Operation Center FundamentalAmir Hossein Zargaran
 
Seucrity in a nutshell
Seucrity in a nutshellSeucrity in a nutshell
Seucrity in a nutshellYahia Kandeel
 
2016 Top 10 Critical Infrastructures and SCADA/ICS Cyber Security Vulnerabili...
2016 Top 10 Critical Infrastructures and SCADA/ICS Cyber Security Vulnerabili...2016 Top 10 Critical Infrastructures and SCADA/ICS Cyber Security Vulnerabili...
2016 Top 10 Critical Infrastructures and SCADA/ICS Cyber Security Vulnerabili...Eran Goldstein
 
Lecture 5
Lecture 5Lecture 5
Lecture 5Education
 
Secure codingguide
Secure codingguideSecure codingguide
Secure codingguideDavid Kwak
 
Firewalls.pdfdifferencesCalculate the number of moles of Mg(NO3)2 in 44.4 g o...
Firewalls.pdfdifferencesCalculate the number of moles of Mg(NO3)2 in 44.4 g o...Firewalls.pdfdifferencesCalculate the number of moles of Mg(NO3)2 in 44.4 g o...
Firewalls.pdfdifferencesCalculate the number of moles of Mg(NO3)2 in 44.4 g o...FahmiOlayah
 
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...Chrysostomos Christofi
 
Sallysspecialservices networksecurityproposal2-100305141834-phpapp02
Sallysspecialservices networksecurityproposal2-100305141834-phpapp02Sallysspecialservices networksecurityproposal2-100305141834-phpapp02
Sallysspecialservices networksecurityproposal2-100305141834-phpapp02Sally's Special Services
 
LIFT OFF 2017: IoT and MSS Deep Dive
LIFT OFF 2017: IoT and MSS Deep DiveLIFT OFF 2017: IoT and MSS Deep Dive
LIFT OFF 2017: IoT and MSS Deep DiveRobert Herjavec
 
System and web security
System and web securitySystem and web security
System and web securitychirag patil
 
12 IoT Cyber Security Threats to Avoid - CyberHive.pdf
12 IoT Cyber Security Threats to Avoid - CyberHive.pdf12 IoT Cyber Security Threats to Avoid - CyberHive.pdf
12 IoT Cyber Security Threats to Avoid - CyberHive.pdfonline Marketing
 
Towards an Analysis of Security Issues, Challenges, and Open Problems in the ...
Towards an Analysis of Security Issues, Challenges, and Open Problems in the ...Towards an Analysis of Security Issues, Challenges, and Open Problems in the ...
Towards an Analysis of Security Issues, Challenges, and Open Problems in the ...Mahmud Hossain
 
hotel management
hotel managementhotel management
hotel managementChetanaNikam1
 
Auditing a Wireless Network and Planning for a Secure WLAN Implementation
Auditing a Wireless Network and Planning for a Secure WLAN ImplementationAuditing a Wireless Network and Planning for a Secure WLAN Implementation
Auditing a Wireless Network and Planning for a Secure WLAN ImplementationCARMEN ALCIVAR
 
Network security and System Admin
Network security and System AdminNetwork security and System Admin
Network security and System AdminMD SAHABUDDIN
 
Top 5 wi fi security threats
Top 5 wi fi security threatsTop 5 wi fi security threats
Top 5 wi fi security threatsgruzabb
 
Spikes Security Isla Isolation
Spikes Security Isla IsolationSpikes Security Isla Isolation
Spikes Security Isla IsolationCybryx
 

Similar to Riordan Network VulnerabilitiesVulnerabilityThreatProbabil.docx (20)

Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Security Operation Center Fundamental
Security Operation Center FundamentalSecurity Operation Center Fundamental
Security Operation Center Fundamental
 
Seucrity in a nutshell
Seucrity in a nutshellSeucrity in a nutshell
Seucrity in a nutshell
 
2016 Top 10 Critical Infrastructures and SCADA/ICS Cyber Security Vulnerabili...
2016 Top 10 Critical Infrastructures and SCADA/ICS Cyber Security Vulnerabili...2016 Top 10 Critical Infrastructures and SCADA/ICS Cyber Security Vulnerabili...
2016 Top 10 Critical Infrastructures and SCADA/ICS Cyber Security Vulnerabili...
 
Lecture 5
Lecture 5Lecture 5
Lecture 5
 
Secure codingguide
Secure codingguideSecure codingguide
Secure codingguide
 
Firewalls.pdfdifferencesCalculate the number of moles of Mg(NO3)2 in 44.4 g o...
Firewalls.pdfdifferencesCalculate the number of moles of Mg(NO3)2 in 44.4 g o...Firewalls.pdfdifferencesCalculate the number of moles of Mg(NO3)2 in 44.4 g o...
Firewalls.pdfdifferencesCalculate the number of moles of Mg(NO3)2 in 44.4 g o...
 
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
 
Sallysspecialservices networksecurityproposal2-100305141834-phpapp02
Sallysspecialservices networksecurityproposal2-100305141834-phpapp02Sallysspecialservices networksecurityproposal2-100305141834-phpapp02
Sallysspecialservices networksecurityproposal2-100305141834-phpapp02
 
LIFT OFF 2017: IoT and MSS Deep Dive
LIFT OFF 2017: IoT and MSS Deep DiveLIFT OFF 2017: IoT and MSS Deep Dive
LIFT OFF 2017: IoT and MSS Deep Dive
 
10 Things That Compromise Patient Data
10 Things That Compromise Patient Data10 Things That Compromise Patient Data
10 Things That Compromise Patient Data
 
System and web security
System and web securitySystem and web security
System and web security
 
12 IoT Cyber Security Threats to Avoid - CyberHive.pdf
12 IoT Cyber Security Threats to Avoid - CyberHive.pdf12 IoT Cyber Security Threats to Avoid - CyberHive.pdf
12 IoT Cyber Security Threats to Avoid - CyberHive.pdf
 
Towards an Analysis of Security Issues, Challenges, and Open Problems in the ...
Towards an Analysis of Security Issues, Challenges, and Open Problems in the ...Towards an Analysis of Security Issues, Challenges, and Open Problems in the ...
Towards an Analysis of Security Issues, Challenges, and Open Problems in the ...
 
hotel management
hotel managementhotel management
hotel management
 
Auditing a Wireless Network and Planning for a Secure WLAN Implementation
Auditing a Wireless Network and Planning for a Secure WLAN ImplementationAuditing a Wireless Network and Planning for a Secure WLAN Implementation
Auditing a Wireless Network and Planning for a Secure WLAN Implementation
 
Network security and System Admin
Network security and System AdminNetwork security and System Admin
Network security and System Admin
 
Top 5 wi fi security threats
Top 5 wi fi security threatsTop 5 wi fi security threats
Top 5 wi fi security threats
 
Spikes Security Isla Isolation
Spikes Security Isla IsolationSpikes Security Isla Isolation
Spikes Security Isla Isolation
 
itmsday2.pptx
itmsday2.pptxitmsday2.pptx
itmsday2.pptx
 

More from joellemurphey

Eastern European countries appear to have become dependent on Ru.docx
Eastern European countries appear to have become dependent on Ru.docxEastern European countries appear to have become dependent on Ru.docx
Eastern European countries appear to have become dependent on Ru.docxjoellemurphey
 
EAS 209 Second Response Paper Topic Assignment Due .docx
EAS 209 Second Response Paper Topic Assignment Due .docxEAS 209 Second Response Paper Topic Assignment Due .docx
EAS 209 Second Response Paper Topic Assignment Due .docxjoellemurphey
 
Earth Science LabIn what order do materials settle in waterSo t.docx
Earth Science LabIn what order do materials settle in waterSo t.docxEarth Science LabIn what order do materials settle in waterSo t.docx
Earth Science LabIn what order do materials settle in waterSo t.docxjoellemurphey
 
EarlyIntervention Strategies Paper (15 points)The pu.docx
EarlyIntervention Strategies Paper (15 points)The pu.docxEarlyIntervention Strategies Paper (15 points)The pu.docx
EarlyIntervention Strategies Paper (15 points)The pu.docxjoellemurphey
 
Early Hominids & Australopithecus SubscribeWhat is a too.docx
Early Hominids & Australopithecus SubscribeWhat is a too.docxEarly Hominids & Australopithecus SubscribeWhat is a too.docx
Early Hominids & Australopithecus SubscribeWhat is a too.docxjoellemurphey
 
Early scholarly and philosophical manuscripts were in Greek. However.docx
Early scholarly and philosophical manuscripts were in Greek. However.docxEarly scholarly and philosophical manuscripts were in Greek. However.docx
Early scholarly and philosophical manuscripts were in Greek. However.docxjoellemurphey
 
Early Learning & Developmental Guidelines July 2017 1 .docx
Early Learning & Developmental Guidelines July 2017 1 .docxEarly Learning & Developmental Guidelines July 2017 1 .docx
Early Learning & Developmental Guidelines July 2017 1 .docxjoellemurphey
 
Early Innovations and Their Impact Today Wilbur and Orville Wrig.docx
Early Innovations and Their Impact Today Wilbur and Orville Wrig.docxEarly Innovations and Their Impact Today Wilbur and Orville Wrig.docx
Early Innovations and Their Impact Today Wilbur and Orville Wrig.docxjoellemurphey
 
Early childhood professionals have an essential role in creating.docx
Early childhood professionals have an essential role in creating.docxEarly childhood professionals have an essential role in creating.docx
Early childhood professionals have an essential role in creating.docxjoellemurphey
 
Early Constitutional ControversiesIn 1788, Alexander Hamilton and .docx
Early Constitutional ControversiesIn 1788, Alexander Hamilton and .docxEarly Constitutional ControversiesIn 1788, Alexander Hamilton and .docx
Early Constitutional ControversiesIn 1788, Alexander Hamilton and .docxjoellemurphey
 
Early Civilizations MatrixUsing your readings and outside sour.docx
Early Civilizations MatrixUsing your readings and outside sour.docxEarly Civilizations MatrixUsing your readings and outside sour.docx
Early Civilizations MatrixUsing your readings and outside sour.docxjoellemurphey
 
Early childhood teachers need to stay connected to what is occurring.docx
Early childhood teachers need to stay connected to what is occurring.docxEarly childhood teachers need to stay connected to what is occurring.docx
Early childhood teachers need to stay connected to what is occurring.docxjoellemurphey
 
Early and Middle Adulthood PaperPrepare a 1,050- to 1,400-word.docx
Early and Middle Adulthood PaperPrepare a 1,050- to 1,400-word.docxEarly and Middle Adulthood PaperPrepare a 1,050- to 1,400-word.docx
Early and Middle Adulthood PaperPrepare a 1,050- to 1,400-word.docxjoellemurphey
 
Earlier this semester, you participated in a class discussion about .docx
Earlier this semester, you participated in a class discussion about .docxEarlier this semester, you participated in a class discussion about .docx
Earlier this semester, you participated in a class discussion about .docxjoellemurphey
 
EAP1640 - Level 6 Writing (Virtual College, MDC) Author P.docx
EAP1640 - Level 6 Writing (Virtual College, MDC) Author P.docxEAP1640 - Level 6 Writing (Virtual College, MDC) Author P.docx
EAP1640 - Level 6 Writing (Virtual College, MDC) Author P.docxjoellemurphey
 
Earlean, please write these notes for me. October 01, 20181. My .docx
Earlean, please write these notes for me. October 01, 20181. My .docxEarlean, please write these notes for me. October 01, 20181. My .docx
Earlean, please write these notes for me. October 01, 20181. My .docxjoellemurphey
 
eam Assignment 4 Teaming Across Distance and Culture..docx
eam Assignment 4 Teaming Across Distance and Culture..docxeam Assignment 4 Teaming Across Distance and Culture..docx
eam Assignment 4 Teaming Across Distance and Culture..docxjoellemurphey
 
ead the following articleMother Tongue Maintenance Among North .docx
ead the following articleMother Tongue Maintenance Among North .docxead the following articleMother Tongue Maintenance Among North .docx
ead the following articleMother Tongue Maintenance Among North .docxjoellemurphey
 
eActivityGo to the United States Equal Employment Oppo.docx
eActivityGo to the United States Equal Employment Oppo.docxeActivityGo to the United States Equal Employment Oppo.docx
eActivityGo to the United States Equal Employment Oppo.docxjoellemurphey
 
Each year on or around June 15, communities and municipalities aroun.docx
Each year on or around June 15, communities and municipalities aroun.docxEach year on or around June 15, communities and municipalities aroun.docx
Each year on or around June 15, communities and municipalities aroun.docxjoellemurphey
 

More from joellemurphey (20)

Eastern European countries appear to have become dependent on Ru.docx
Eastern European countries appear to have become dependent on Ru.docxEastern European countries appear to have become dependent on Ru.docx
Eastern European countries appear to have become dependent on Ru.docx
 
EAS 209 Second Response Paper Topic Assignment Due .docx
EAS 209 Second Response Paper Topic Assignment Due .docxEAS 209 Second Response Paper Topic Assignment Due .docx
EAS 209 Second Response Paper Topic Assignment Due .docx
 
Earth Science LabIn what order do materials settle in waterSo t.docx
Earth Science LabIn what order do materials settle in waterSo t.docxEarth Science LabIn what order do materials settle in waterSo t.docx
Earth Science LabIn what order do materials settle in waterSo t.docx
 
EarlyIntervention Strategies Paper (15 points)The pu.docx
EarlyIntervention Strategies Paper (15 points)The pu.docxEarlyIntervention Strategies Paper (15 points)The pu.docx
EarlyIntervention Strategies Paper (15 points)The pu.docx
 
Early Hominids & Australopithecus SubscribeWhat is a too.docx
Early Hominids & Australopithecus SubscribeWhat is a too.docxEarly Hominids & Australopithecus SubscribeWhat is a too.docx
Early Hominids & Australopithecus SubscribeWhat is a too.docx
 
Early scholarly and philosophical manuscripts were in Greek. However.docx
Early scholarly and philosophical manuscripts were in Greek. However.docxEarly scholarly and philosophical manuscripts were in Greek. However.docx
Early scholarly and philosophical manuscripts were in Greek. However.docx
 
Early Learning & Developmental Guidelines July 2017 1 .docx
Early Learning & Developmental Guidelines July 2017 1 .docxEarly Learning & Developmental Guidelines July 2017 1 .docx
Early Learning & Developmental Guidelines July 2017 1 .docx
 
Early Innovations and Their Impact Today Wilbur and Orville Wrig.docx
Early Innovations and Their Impact Today Wilbur and Orville Wrig.docxEarly Innovations and Their Impact Today Wilbur and Orville Wrig.docx
Early Innovations and Their Impact Today Wilbur and Orville Wrig.docx
 
Early childhood professionals have an essential role in creating.docx
Early childhood professionals have an essential role in creating.docxEarly childhood professionals have an essential role in creating.docx
Early childhood professionals have an essential role in creating.docx
 
Early Constitutional ControversiesIn 1788, Alexander Hamilton and .docx
Early Constitutional ControversiesIn 1788, Alexander Hamilton and .docxEarly Constitutional ControversiesIn 1788, Alexander Hamilton and .docx
Early Constitutional ControversiesIn 1788, Alexander Hamilton and .docx
 
Early Civilizations MatrixUsing your readings and outside sour.docx
Early Civilizations MatrixUsing your readings and outside sour.docxEarly Civilizations MatrixUsing your readings and outside sour.docx
Early Civilizations MatrixUsing your readings and outside sour.docx
 
Early childhood teachers need to stay connected to what is occurring.docx
Early childhood teachers need to stay connected to what is occurring.docxEarly childhood teachers need to stay connected to what is occurring.docx
Early childhood teachers need to stay connected to what is occurring.docx
 
Early and Middle Adulthood PaperPrepare a 1,050- to 1,400-word.docx
Early and Middle Adulthood PaperPrepare a 1,050- to 1,400-word.docxEarly and Middle Adulthood PaperPrepare a 1,050- to 1,400-word.docx
Early and Middle Adulthood PaperPrepare a 1,050- to 1,400-word.docx
 
Earlier this semester, you participated in a class discussion about .docx
Earlier this semester, you participated in a class discussion about .docxEarlier this semester, you participated in a class discussion about .docx
Earlier this semester, you participated in a class discussion about .docx
 
EAP1640 - Level 6 Writing (Virtual College, MDC) Author P.docx
EAP1640 - Level 6 Writing (Virtual College, MDC) Author P.docxEAP1640 - Level 6 Writing (Virtual College, MDC) Author P.docx
EAP1640 - Level 6 Writing (Virtual College, MDC) Author P.docx
 
Earlean, please write these notes for me. October 01, 20181. My .docx
Earlean, please write these notes for me. October 01, 20181. My .docxEarlean, please write these notes for me. October 01, 20181. My .docx
Earlean, please write these notes for me. October 01, 20181. My .docx
 
eam Assignment 4 Teaming Across Distance and Culture..docx
eam Assignment 4 Teaming Across Distance and Culture..docxeam Assignment 4 Teaming Across Distance and Culture..docx
eam Assignment 4 Teaming Across Distance and Culture..docx
 
ead the following articleMother Tongue Maintenance Among North .docx
ead the following articleMother Tongue Maintenance Among North .docxead the following articleMother Tongue Maintenance Among North .docx
ead the following articleMother Tongue Maintenance Among North .docx
 
eActivityGo to the United States Equal Employment Oppo.docx
eActivityGo to the United States Equal Employment Oppo.docxeActivityGo to the United States Equal Employment Oppo.docx
eActivityGo to the United States Equal Employment Oppo.docx
 
Each year on or around June 15, communities and municipalities aroun.docx
Each year on or around June 15, communities and municipalities aroun.docxEach year on or around June 15, communities and municipalities aroun.docx
Each year on or around June 15, communities and municipalities aroun.docx
 

Recently uploaded

Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Dr. Mazin Mohamed alkathiri
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 đź’ž Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 đź’ž Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 đź’ž Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 đź’ž Full Nigh...Pooja Nehwal
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 

Recently uploaded (20)

Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 đź’ž Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 đź’ž Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 đź’ž Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 đź’ž Full Nigh...
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 

Riordan Network VulnerabilitiesVulnerabilityThreatProbabil.docx

  • 1. Riordan Network Vulnerabilities Vulnerability Threat Probability Impact Suggested Mitigation Steps 1 USB DRIVE The most common way to infect a network from inside a firewall Implement and enforce policies regarding use of such devices. 2 LAPTOP Can tap directly into the network and infect with malware allowing others access Implement and enforce policies regarding portable devices. 3 BLUETOOTH Identity detection, DOS, involuntary control and access of data Implement and enforce policies regarding use of such devices. 4 WI-FI Clear text data can be captured Implement and enforce policies regarding use of such devices.
  • 2. 5 FIREWALL Protects content on desktops and in turn keeps entire network safe Install and configure firewalls 6 NETWORK PROTOCOLS Flawed unpatched protocols can cause remote sabotage and DOS Disable unused protocols and monitor ones being used. 7 SMARTPHONES Potentially pose the same threats as notebooks and thumb drives Implement and enforce policies regarding use of such devices. 8 OPTICAL MEDIA Being able to steal and leaking confidential data Implement and enforce policies regarding access and use of recordable media. 9 ROUTERS Exposed ports, Network access Install and configure routers based on industry standards 10 NETWORK CABLES Reduce the danger of electronic interference or loss of network
  • 3. connectivity Install cable in areas to minimize interference. Label cables. 11 PRINTERS While the print task is in the queue, the data is unencrypted and vulnerable to theft Update printer firmware and keep an update inventory of all printers and drivers 12 FAX MACHINES Unsecure faxing will put you at risk for confidential and identity theft Implement and enforce policies regarding information distribution 13 SAN STORAGE Network availability Limit access to data storage based on classification and need to know. 14 EMPLOYEES Individuals having access to restricted area of the network Maintain a strict access control policy for restricted areas. 15 SERVERS Open to brute force attacks, botnets, cross-site scripting and
  • 4. DOS Harden servers against cyber attacks using industry standard or better. 16 WORKSTATIONS Can be used by attackers as "slave" machines in coordinated attacks. Harden workstations against cyber attacks using industry standard or better. 17 VIDEO CONFRENCING Machines set to auto answer will allow the attacker to essentially gain a front-row seat inside corporate meetings Should be hardened disable auto answer to prevent eaves dropping. 18 THEFT Attacker steals privilege information to gain access Access control and password policy 19 IMPERSONATION Attacker poses as a service provider or custodial crew to physically gain access Security awareness training and policy 20 LAPTOPS/TABLETS
  • 5. Portable and easy to hide and attach to network. Implement and enforce portable device policy 21 USB DEVICES MP3 Players, etc Implement strict policies regarding USB devices. 22 FIRE ALARM Fire retardant system does not work when needed Test fire alarm system periodically 23 ELECTRICAL POWER No backup power in case of public power outage Backup generators and UPS for critical systems 24 AIR CONDITION SYSTEM Cooling system fail causing equipment to overheat and fail Service and maintain heating and cooling system. 25 POOR MAINTENANCE Do not know when unauthorized equipment is attached to the network Inventory and label all equipment and document change management
  • 6. Logical Network Vulnerabilities 1 DATABASE SQL Injection, DOS Attacks, Database Exposure and Privilege elevation 2 VPN Confidential information can be inadvertently downloaded. Unobstructed route for Malware. 3 MAN-IN-THE-MIDDLE Attacker monitors and steals Information in real time Use cryptography and Hashed Message Authentication Codes 4 PRIVILEGE ESCALATION Individual gains access to network higher functions due to misconfiguration Check Roles, Use strong ACLs; and use standard encryption 5 PHISHING Used by an attacker to collect sensitive information to gain access Segment network and encrypt data
  • 7. 6 FOOTPRINTING Attacker use default username and weak or blank password to gain access to the network Strong password, do not use blank password or weak 7 HIJACKING Attacker can take over your internet browser downloading additional malware Use session and communication encryption. Apply patch to fix vulnerabilities 8 SOCIAL ENGINEERING Attackers will trick users into revealing their passwords Security awareness training. 9 PASSWORDS Easy guessable passwords, hackers gain initial access to a system. Enforce strong password; lock out and audit trails 10 DIGITIAL CERTIFICATE Attackers hack into certificate authorities and issue false certificates for legitimate websites Revoke PKI and maintain list of revoked keys to id false certificates.
  • 8. 11 OPERATING SYSTEM If not patched regularly the network is open to security vulnerabilities Harden OS 12 TCP/IP Vulnerable to a variety of attacks ranging from password sniffing to denial of service Disable unnecessary protocols 13 EMAIL Spyware, Virus, Phishing, and spam Conduct cyber security awareness to educate end user of email threats. 14 WEB BROWSERS Attacker can take over your browser making you vulnerable if the browser plug-ins are not fully patched Configure secure web permissions; Use .Net Framework access control 15 INSTANT MESSAGING Vulnerable to firewall tunneling, identity theft, data security leaks, and authentication spoofing Strong password, do not cache password,
  • 9. 16 SECURITY MISCONFIG Attackers can access networks virtually without attracting attention Configure based on industry standard. Avoid custom configuration 17 WEB APPLICATIONS DOS, Elevation of privilege, Information disclosure, and impersonation Input validation Use HTMLEncode and URLEncode functions to encode any output 18 MALWARE Can infect networked resources and possibly bring down the network Update definition files and patches. 19 SOFTWARE DEFECT Allows data to be viewed by unauthorized people Apply updates and patch vulnerabilities. Or uninstall and replace. 20 SPOOFING An attacker pretends to be an entity to take over communication between systems
  • 10. Strong authentication. Do not store secrets Do not pass credentials in plaintext over the wire. Protect authentication cookies with SSL. 21 DOS ATTACK An attack on a network that causes a loss of service to users Resource and bandwidth throttling techniques. Validate and filter input. 22 SNIFFER ATTACK Can read, monitor, and capture network data exchanges Segment network. Encrypt data. 23 BUFFER OVERFLOW Exploits poorly written software to allow attackers to take over the target system Validate input Inspect API managed code. Use the /GS flag to compile code 24 REMOTE ACCESS Without the appropriate security measures (SSL VPN), all communications are being transmitted in clear text Configure remote access with the necessary security parameters
  • 11. to ensure secure communication. 25 NO ANTIVIRUS Not Protected against virus and other malware attacks Install, configure and update antivirus software. 3 Created a table of 50 vulnerabilities and threat pairs relevant to the organization 0.00 0.70 0.85 1.00 0.85 Comment: Trying to find 50 vulnerabilities is not an easy task. Not every item is a vulnerability. Some are attacks, some are threats, and some are vulnerabilities.