Question: 1 . Identify and explain 3 network security problems and 3 infrastructure design problems with company B 2 . Discuss the risks, likelihood and impact

1. Identify and explain 3 network security problems and 3 infrastructure design problems with company B2. Discuss the risks, likelihood and impact associated with 3 of the network security and infrastructure design problems identified in company BCompany B performed this vulnerability assessment in anticipation of system integration with Company A.This assessment was performed by a qualified third-party assessor, and this report has been generated with the results. This assessment was performed in accordance with a methodology described in NIST 800-30 Rev 1 to identify the following: Vulnerabilities using the CVSS model Severity Likelihood of occurrenceTable A. Risk ClassificationsRisk LevelDescriptionHighThe loss of confidentiality, integrity, or availability may be expected to have a severe or catastrophic adverse effect on organizational operations, organizational assets, or individuals.ModerateThe loss of confidentiality, integrity, or availability may be expected to have a serious adverse effect on organizational operations, organizational assets, or individuals.LowThe loss of confidentiality, integrity, or availability may be expected to have a limited adverse effect on organizational operations, organizational assets, or individuals.Table B. SeveritySeverity Level(CVSS Model)DescriptionCritical Exploitation of the vulnerability likely results in root-level compromise of servers or infrastructure devices. Exploitation is usually straightforward in the sense that the attacker does not need any special authentication credentials or knowledge about individual victims and does not need to persuade a target user, for example, via social engineering, to perform any special functions.High The vulnerability is difficult to exploit. Exploitation could result in elevated privileges. Exploitation could result in significant data loss or downtime.Medium Vulnerabilities that require the attacker to manipulate individual victims via social engineering tactics. Denial of service vulnerabilities that are difficult to set up. Exploits that require an attacker to reside on the same local network as the victim. Vulnerabilities where exploitation provides only very limited access. Vulnerabilities that require user privileges for successful exploitation.LowExploitation of such vulnerabilities usually requires local or physical system access and would have little impact on the organization.Table C. Level of EffortLevel of EffortDescriptionHighThis requires a high level of dedicated effort from one or more teams on critical systems, including patching, multiple configuration changes, or highly technical changes that risk bringing services down.ModerateThis is a medium-level effort that requires substantial dedication from a partial or entire team. This could impact services or cause a partial outage.LowThese are individual or small team efforts generally requiring a minimal time commitment and require running an update or remedial command or series of commands that will not impact production services.Table D. System InventorySystem ComponentsServersVirtualized farm running on Hyper-V (2 hosts). Windows Server 2019 and Ubuntu Linux. Approximately 20 virtualized servers (across the 2 hosts), including the following roles: (Ubuntu Linux) FTP server for EDI Incoming Operations 3x Domain Controllers (1 used for M365 identity sync)1x File Storage/Server 1x Ruby On Rails server 3x ElasticSearch servers (cluster)5x web application servers (Ubuntu Linux cluster, 1x PostGRESQL, 1x MariaDB SQL,3x running nginX Plus w\reverse caching proxy, 1x running Apache Tomcat, PHP 8, hosting SSL/TLS certificates)4x Remote Desktop Servers for internal shared/applications 2x legacy Exchange servers (post-migration)75 WorkstationsWindows XP,7,10/11 Pro, Ubuntu Linux, MacOSSwitchesHPE JL262A Aruba 2930F 48G PoE+Firewall2x Sophos XG firewallsBorder routerVerizon FIOS router (CR1000A)LaptopsWindows 10,11, Ubuntu 22.04 LTS, MacOS (Ventura, Monterey, Big Sur)Wireless Access Points10x HPE JZ337A Aruba AP-535Cable plantCat6aTable E. Risk IdentificationRisk #Vulnerability(NVT Name)NVT OIDSeverityRiskLevel of Effort1Distributed Ruby (dRuby/DRb) Multiple Remote Code Execution Vulnerabilities1.3.6.1.4.1.25623.1.0.108010CriticalHighHigh2MFA not enforced across all usersHighHighHigh3Rexec service is running1.3.6.1.4.1.25623.1.0.100111HighHighLow4All users have local administrative privilegesMediumModerateHigh5Java RMI Server Insecure Default Configuration Remote Code Execution Vulnerability on publicly-facing server1.3.6.1.4.1.25623.1.0.140051CriticalHighModerate6Operating System (OS) End of Life (EOL) Detection1.3.6.1.4.1.25623.1.0.103674CriticalHighLow7rlogin Passwordless Login1.3.6.1.4.1.25623.1.0.113766HighModerateLow8Apache Tomcat AJP RCE Vulnerability (Ghostcat)1.3.6.1.4.1.25623.1.0.143545CriticalHighModerate9PostgreSQL weak password1.3.6.1.4.1.25623.1.0.103552HighHighLow10PostgreSQL admin is reachable from internetCriticalHighLow11VNC Brute Force Login1.3.6.1.4.1.25623.1.0.106056HighHighLow12FTP Brute Force Logins Reporting1.3.6.1.4.1.25623.1.0.108718HighHighLow13phpinfo() output Reporting1.3.6.1.4.1.25623.1.0.11229HighModerateLow14vsftpd Compromised Source Packages Backdoor Vulnerability1.3.6.1.4.1.25623.1.0.103185HighHighModerate15rsh Unencrypted Cleartext Login1.3.6.1.4.1.25623.1.0.100080HighModerateModerate16SSL/TLS: OpenSSL CCS Man in the Middle Security Bypass Vulnerability1.3.6.1.4.1.25623.1.0.105042HighModerateModerate17Anonymous FTP Login Reporting1.3.6.1.4.1.25623.1.0.900600ModerateLow18Samba MS-RPC Remote Shell Command Execution Vulnerability - Active Check1.3.6.1.4.1.25623.1.0.108011HighModerateHigh19SSL/TLS: Deprecated SSLv2 and SSLv3 Protocol Detection1.3.6.1.4.1.25623.1.0.111012ModerateModerateModerate20Weak Host Key Algorithm(s)(SSH)1.3.6.1.4.1.25623.1.0.117687ModerateModerateModerateCompany B Cyber Security ToolsCompany B has provided this list of cyber security tools in anticipation of being acquired by Company A.This list is assumed to be complete.Table A. Cyber Security ToolsTool NamePurposeSophos/Intercept XEndpoint Detection and ResponseOneTrustData privacy/Data lifecycle managementCode42Data-centric securitySophos XGNext-Gen FirewallsNo tool availableMobile Device & Application ManagementDUOIdentity and Access ManagementAkamaiApplication SecurityMimecastMessaging SecurityArctic WolfManaged Security Services ProviderCisco UmbrellaDNS SecurityIn progressCyber security policyIn progressWritten Information Security Policy (WISP)In progressWritten proceduresMinimalDocumentation of environment
1 . Identify and explain 3 network security

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Programming Questions!