Results of classroom enterprise security assessment of five large enterprise networks

  • Authors:
  • George L. Wooley

  • Affiliations:
  • Department of Mathematics and Computer Science, University of Maryland, Eastern Shore Princess Anne, MD

  • Venue:
  • Journal of Computing Sciences in Colleges
  • Year:
  • 2003

Quantified Score

Hi-index 0.00

Visualization

Abstract

The paper addresses a full network security assessment of the working network of five enterprises. Our activities were evaluative assessments that were performed with no actual touches of the network itself. We start the paper with the handling of the issues of assessment confidential and methodology. In additional to requesting background information, we requested each enterprise answer 16 questions. As the assessments continued, additional questions were handled case by case until complete packages were formed. The paper captures summary findings that involve IP address and authentication, Intrusion Detection Systems, Demilitarized Zones, Wireless Network, Virtual Private Networks and most glaring Security Policy problems.