Erik W. Failing
College of Information Technology, Western Governors University.
D482: Secure Network Design.
Wendy Campbell
March 5th, 2024
Performance Assessment: Secure Network Design (DHN1).
In this paper, I, Erik W. Failing, aim to showcase the skills and knowledge I have acquired in the class D482: Secure Network Design. This competency demonstration will align with the performance assessment criteria specified for the course. To ensure clarity and facilitate evaluation, the paper will be organized systematically, with sections directly mirroring the rubric items for straightforward navigation. The primary method of addressing these requirements will be through …show more content…
This poses a significant risk to Company A’s business requirements by compromising the confidentiality and integrity of customer financial data. User accounts protected by 8-character passwords can be easily compromised through brute-force attacks.
Problem 2: All users possess local administrative privileges. This presents a challenge for Company A’s business requirements, as it significantly increases the risk of successful cyber-attacks against the company. Any user can accidentally or intentionally install problematic software and/or alter system security settings.
Company B
Problem 1: Multi-factor authentication is not enforced for all users. This poses a risk to Company B’s business requirements by increasing the likelihood of user accounts and their associated confidential data being compromised. Without multi-factor authentication, an attacker can easily phish credentials from an employee or customer and log into their account.
Problem 2: Root login is not permitted without a password. This greatly increases the risk of successful cyber-attacks against Company B. If an attacker gains unauthorized access to a device on the company network, they can obtain root access by default, without needing to escalate privileges. This allows them to inflict substantial damage much more quickly.
Infrastructure