20 Oct You are the cybersecurity professional for Company A and are responsible for protecting the information of the company. Your roles include managing the com
You are the cybersecurity professional for Company A and are responsible for protecting the information of the company. Your roles include managing the company’s cybersecurity capabilities and tools, conducting vulnerability management, and assessing risk to sensitive information. Company A has recently purchased Company B and wants to merge both networks.
Executives of Company A have tasked you with making risk-based decisions on integrating Company B’s network with Company A’s existing network. Company B has provided its latest vulnerability scans, network diagrams, and existing cybersecurity capabilities and tools. As a deliverable to the executives, you will submit your recommendations for a secure network design that merges the two networks and allows remote access for employees of both companies in the form of a merger and implementation plan.
For this project, you will use the given scenario and the following supporting documents to complete your network merger and implementation plan:
• “Company A Network Diagram”
• “Company A Risk Analysis”
• “Company B Network Diagram”
• “Company B Vulnerability Report and Cybersecurity Tools”
Scenario Company A is a global company based in the United States that operates in the financial industry. Company A serves its customers with financial products, such as checking accounts, bank cards, and investment products. Company A has recently acquired Company B and needs to integrate with or remove similar capabilities and tools from Company B. Company B is smaller in size, has no dedicated cybersecurity professional role, and utilizes third-party support for infrastructure needs. Company B offers specialized software to medical providers and accepts credit cards as a payment option. The executives of the newly merged company have expressed interest in integrating the use of the cloud to allow for scalability and redundancy. As the security professional of the merged networks, you are tasked with creating a secure network design that includes the use of zero trust principles and that utilizes both on-premises and cloud infrastructure. You also have been tasked with ensuring compliance with all regulatory requirements of the merged company, along with utilizing cloud-based technologies to provide security capabilities. Company executives have provided a budget of $50,000 in the first year to create a secure network design to utilize cloud-based services. Requirements Your submission must be your original work.
. A. Describe two current network security problems and two current infrastructure problems for each company, based on business requirements given in the scenario.
B. Analyze the given network diagram and vulnerability scan for both companies by doing the following: 1. Describe two existing vulnerabilities for each company. 2. Explain the impact, risk, and likelihood associated with each described vulnerability from part B1 as it relates to each company.
C. Create a network topology diagram with details of the proposed merged network requirements.
D. Identify the layer for all components in the topology diagram referencing the layers of the OSI model and TCP/IP protocol stack.
E. Explain the rationale for adding, deleting, or repurposing network components in the newly merged network topology diagram, including details of how each component addresses budgetary constraints. F. Explain two secure network design principles that are used in the proposed network topology diagram.
G. Explain how the proposed merged network topology diagram addresses two regulatory compliance requirements that are relevant to the newly merged company, including the following in your explanation: • the name of the regulatory compliance requirement • why the regulatory requirement is relevant to the newly merged company • how the proposed merged network topology diagram meets the regulatory requirement
H. Describe two emerging threats that are applicable to the merged organization, including the following in the description: • potential network security risks of implementing the topology • potential performance impacts on the merged network after implementation of the proposed design • how to manage the identified potential security risks
I. Summarize your recommendations for implementation of this proposed merged network based on the scenario and budgetary requirements, including the following in the summary: • a cost-benefit analysis for on-premises and cloud infrastructure solutions • a justification for your recommendations to implement the proposed secure merged network design
J. Acknowledge sources, using in-text citations and references, for content that is quoted, paraphrased, or summarized.
K. Demonstrate professional communication in the content and presentation of your submission.
Follow this rubric : A:BUSINESS REQUIREMENTS:The submission accurately describes 2 or more current network security problems and at 2 or more current infrastructure problems for each company and is aligned with the business requirements given in the scenario.
B1:VULNERABILITIES : The submission accurately describes 2 or more existing vulnerabilities for each company. The vulnerabilities described are in alignment with the given network diagram and vulnerability scan.
B2:IMPACT, RISK, LIKELIHOOD: The submission explains the impact, risk, and likelihood associated with each described vulnerability from part B1 as it relates to each company. The explanation is complete and in alignment with the given network diagram and vulnerability scan.
C:TOPOLOGY DIAGRAM: The network topology diagram with the details of the proposed merged network requirements is provided. The diagram is complete and meets the needs provided in the scenario. MAke a table under the topology for costs that include everything that we added and show that it stays under the 50k budget
D:TOPOLOGY COMPONENTS: The submission correctly identifies the layer for all components in the topology diagram referencing the layers of the OSI and TCP/IP protocol stack
E:RATIONALE : The submission explains the rationale for adding, deleting, or repurposing network components in the newly merged network topology diagram and includes the details of how each component addresses budgetary constraints. The explanation is in alignment with the given scenario. F:SECURE NETWORK DESIGN PRINCIPLES : The submission explains 2 or more secure network design principles that are used in the proposed network topology diagram. The explanation clearly names the secure network design principles being used and how each principle aligns with the proposed network topology diagram.
G:REGULATORY COMPLIANCE : The submission accurately explains how the proposed merged network topology diagram addresses 2 or more regulatory compliance requirements and includes all of the listed components. The regulatory compliance requirements are relevant to the newly merged company.
H:EMERGING THREATS : The submission accurately describes 2 or more emerging threats that are applicable to the newly merged organization and includes all the given points.
I:SUMMARY RECOMMENDATIONS: The submission summarizes the recommendations for implementation of the proposed merged network. The summary is logical and in alignment with the scenario and budgetary requirements and includes all listed specifications.
DHN1: Secure Network Design Company A Risk Analysis
PAGE 1
PAGE 2
Company A Risk Analysis
Company A performed an internal risk analysis in anticipation of system integration with Company B. This risk analysis was performed in accordance with NIST SP 800-30 Rev 1 to identify the following:
• vulnerabilities
• risk likelihood
Table A. Risk Classifications
Risk Level |
Description |
High |
The loss of confidentiality, integrity, or availability may be expected to have a severe or catastrophic adverse effect on organizational operations, organizational assets, or individuals. |
Moderate |
The loss of confidentiality, integrity, or availability may be expected to have a serious adverse effect on organizational operations, organizational assets, or individuals. |
Low |
The loss of confidentiality, integrity, or availability may be expected to have a limited adverse effect on organizational operations, organizational assets, or individuals. |
Table B. Data Sensitivity
Type of Data |
Sensitivity |
||
Confidentiality |
Integrity |
Availability |
|
Customer PII (e.g., Account Numbers, Social Security Numbers, and Phone Numbers) |
High |
High |
Moderate |
Employee PII (e.g., Social Security Numbers and Employee Identification Numbers) |
High |
High |
Moderate |
Company intellectual property (e.g., credit scoring calculations) |
High |
High |
Moderate |
Marketing and advertising |
Moderate |
Moderate |
Low |
Table C. System Inventory
System Components |
|
Servers |
Windows server 2019; role: internal SharePoint server Windows server 2019; role: Exchange server Windows server 2012; role: Application server Windows server 2012R2; File server DMZ Windows server 2012; role: FTP and external Web Server |
Workstations |
75 – Windows 10 Pro 20 – configured for remote desktop access |
Switches |
4 – Cisco 3750X |
Firewall |
Fortinet’s Fortigate 800D NGFW |
Border router |
Cisco 7600 |
Laptops |
14 – Windows 7 6 – Windows 11 |
Wireless Access Points |
2 – Meraki MR28 |
Cable plant |
Cat5e |
Table D. Risk Identification
Risk # |
Vulnerability |
Risk Likelihood |
1 |
Open ports 21-90, 3389 |
High |
2 |
All users use eight-character passwords |
High |
3 |
User accounts no longer required are not removed |
Moderate |
4 |
All users have local administrative privileges |
Moderate |
5 |
Regular password changes are not enforced |
Moderate |
6 |
End-of-Life Equipment in use |
Low |
image1.jpeg
,
DHN1: Secure Network Design
PAGE 1
PAGE 2
Company B Vulnerability Report
Company B performed this vulnerability assessment in anticipation of system integration with Company A. This assessment was performed by a qualified third-party assessor, and this report has been generated with the results. This assessment was performed in accordance with a methodology described in NIST 800-30 Rev 1 to identify the following:
· Vulnerabilities using the CVSS model
· Severity
· Likelihood of occurrence
Table A. Risk Classifications
Risk Level |
Description |
High |
The loss of confidentiality, integrity, or availability may be expected to have a severe or catastrophic adverse effect on organizational operations, organizational assets, or individuals. |
Moderate |
The loss of confidentiality, integrity, or availability may be expected to have a serious adverse effect on organizational operations, organizational assets, or individuals. |
Low |
The loss of confidentiality, integrity, or availability may be expected to have a limited adverse effect on organizational operations, organizational assets, or individuals. |
Table B. Severity
Severity Level (CVSS Model) |
Description |
Critical |
· Exploitation of the vulnerability likely results in root-level compromise of servers or infrastructure devices. · Exploitation is usually straightforward in the sense that the attacker does not need any special authentication credentials or knowledge about individual victims and does not need to persuade a target user, for example, via social engineering, to perform any special functions. |
High |
· The vulnerability is difficult to exploit. · Exploitation could result in elevated privileges. · Exploitation could result in significant data loss or downtime. |
Medium |
· Vulnerabilities that require the attacker to manipulate individual victims via social engineering tactics. · Denial of service vulnerabilities that are difficult to set up. · Exploits that require an attacker to reside on the same local network as the victim. · Vulnerabilities where exploitation provides only very limited access. · Vulnerabilities that require user privileges for successful exploitation. |
Low |
Exploitation of such vulnerabilities usually requires local or physical system access and would have little impact on the organization. |
Table C. Level of Effort
Level of Effort |
Description |
High |
This requires a high level of dedicated effort from one or more teams on critical systems, including patching, multiple configuration changes, or highly technical changes that risk bringing services down. |
Moderate |
This is a medium-level effort that requires substantial dedication from a partial or entire team. This could impact services or cause a partial outage. |
Low |
These are individual or small team efforts generally requiring a minimal time commitment and require running an update or remedial command or series of commands that will not impact production services. |
Table D. System Inventory
System Components |
|
Servers |
Virtualized farm running on Hyper-V (2 hosts). Windows Server 2019 and Ubuntu Linux. Approximately 20 virtualized servers (across the 2 hosts), including the following roles: · (Ubuntu Linux) FTP server for EDI Incoming Operations · 3x Domain Controllers (1 used for M365 identity sync) · 1x File Storage/Server · 1x Ruby On Rails server · 3x ElasticSearch servers (cluster) · 5x web application servers (Ubuntu Linux cluster, 1x PostGRESQL, 1x MariaDB SQL, 3x running nginX Plus wreverse caching proxy, 1x running Apache Tomcat, PHP 8, hosting SSL/TLS certificates) · 4x Remote Desktop Servers for internal shared/applications · 2x legacy Exchange servers (post-migration) |
75 Workstations |
Windows XP, 7, 10/11 Pro, Ubuntu Linux, MacOS |
Switches |
HPE JL262A Aruba 2930F 48G PoE+ |
Firewall |
2x Sophos XG firewalls |
Border router |
Verizon FIOS router (CR1000A) |
Laptops |
Windows 10, 11, Ubuntu 22.04 LTS, MacOS (Ventura, Monterey, Big Sur) |
Wireless Access Points |
10x HPE JZ337A Aruba AP-535 |
Cable plant |
Cat6a |
Table E. Risk Identification
Risk # |
Vulnerability (NVT Name) |
NVT OID |
Severity |
Risk |
Level of Effort |
1 |
Distributed Ruby (dRuby/DRb) Multiple Remote Code Execution Vulnerabilities |
1.3.6.1.4.1.25623.1.0.108010 |
Critical |
High |
High |
2 |
MFA not enforced across all users |
High |
High |
High |
|
3 |
Rexec service is running |
1.3.6.1.4.1.25623.1.0.100111 |
High |
High |
Low |
4 |
All users have local administrative privileges |
Medium |
Moderate |
High |
|
5 |
Java RMI Server Insecure Default Configuration Remote Code Execution Vulnerability on publicly-facing server |
1.3.6.1.4.1.25623.1.0.140051 |
Critical |
High |
Moderate |
6 |
Operating System (OS) End of Life (EOL) Detection |
1.3.6.1.4.1.25623.1.0.103674 |
Critical |
High |
Low |
7 |
rlogin Passwordless Login |
1.3.6.1.4.1.25623.1.0.113766 |
High |
Moderate |
Low |
8 |
Apache Tomcat AJP RCE Vulnerability (Ghostcat) |
1.3.6.1.4.1.25623.1.0.143545 |
Critical |
High |
Moderate |
9 |
PostgreSQL weak password |
1.3.6.1.4.1.25623.1.0.103552 |
High |
High |
Low |
10 |
PostgreSQL admin is reachable from internet |
Critical |
High |
Low |
|
11 |
VNC Brute Force Login |
1.3.6.1.4.1.25623.1.0.106056 |
High |
High |
Low |
12 |
FTP Brute Force Logins Reporting |
1.3.6.1.4.1.25623.1.0.108718 |
High |
High |
Low |
13 |
phpinfo() output Reporting |
1.3.6.1.4.1.25623.1.0.11229 |
High |
Moderate |
Low |
14 |
vsftpd Compromised Source Packages Backdoor Vulnerability |
1.3.6.1.4.1.25623.1.0.103185 |
High |
High |
Moderate |
15 |
rsh Unencrypted Cleartext Login |
1.3.6.1.4.1.25623.1.0.100080 |
High |
Moderate |
Moderate |
Our website has a team of professional writers who can help you write any of your homework. They will write your papers from scratch. We also have a team of editors just to make sure all papers are of HIGH QUALITY & PLAGIARISM FREE. To make an Order you only need to click Ask A Question and we will direct you to our Order Page at WriteDemy. Then fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline. Fill in all the assignment paper details that are required in the order form with the standard information being the page count, deadline, academic level and type of paper. It is advisable to have this information at hand so that you can quickly fill in the necessary information needed in the form for the essay writer to be immediately assigned to your writing project. Make payment for the custom essay order to enable us to assign a suitable writer to your order. Payments are made through Paypal on a secured billing page. Finally, sit back and relax. |