Premium Essay

Two Vulnerabilities in Qwd’s Network Design Pose a Threat to Qwd’s Future

In:

Submitted By rcalzadilla
Words 1046
Pages 5
Two Vulnerabilities in QWD’s Network Design Pose a Threat to QWD’s Future

Submitted to: Dean Farwood
SE571 Principle of Information Security and Privacy
Keller Graduate School of Management
Submitted: January 23, 2011

Table of Contents Executive Summary 3 Company Overview 3 Company Vulnerabilities 4 Corporate Website accessible to customers should be on its own web server in a Demilitarized Zone (DMZ). 4 Microsoft SharePoint can potentially allow Remote Code Execution. 5 Works Cited 7

Executive Summary
Purpose of this report is to inform of the possible threat that faces Quality Web Design (QWD) as it continues to improve it services to its customers and provide additional accommodation to its employees to meet and exceed the client’s needs in order to meet strategic goals. QWD specializes in Web site and Web content design for all types of businesses. With well over 250,000 proprietary images and graphic design that will enhance most web site’s appeal, QWD is poised to be the number one global leading brand in Web site and Web content design. Yet, two vulnerabilities in QWD’s network design seem to pose a security threat to QWD’s future leadership and competitiveness that must be address before exploited. First, customers are given access to the corporate website such design poses a security risk since the corporate intranet is hosted on the same web server. Should web server come under attack and be infected with a malware this can potentially disrupt business operation and damage existing relations with existing and potential customers. It can also damage QWD’s existing reputation and corporate stance that can have long lasting effects. Second, Microsoft SharePoint, an integrated server application and content management software, must be maintained by ensuring that security updates and patches are applied. Not doing so can put QDW

Similar Documents

Premium Essay

Nt1230

... Saved Papers Home Page » Computers and Technology Future In: Computers and Technology Future Vincent Fernandez April 24, 2013 Mr. Greene NT1230 Lab 5.1 Exercise 5.1.1 Bridges standards which include bridging, spanning tree and others it links many of the other 802 projects. Such as 802.3(Ethernet) 802.11 (Wi-Fi) and 802.1b standards. Exercise 5.1.2 In June 2003, the IEEE approved a standard, IEEE 802.3af, for Power over Ethernet technology. The standard specified a 15.4W maximum power delivery from the network device, also known as power sourcing equipment (PSE), to an end device, also known as a powered device (PD). The average maximum power available to the PD is 12.95W after accounting for cable loss. This expands broader end device coverage such as Cisco IP phone 7941G-GE/7961G-GE/7985G and wireless access points http://www.networkworld.com/details/4681.html 802.3af, also known as Power over Ethernet, defines a way to build Ethernet power-sourcing equipment and powered terminals Exercise 5.1.3 In book Exercise 5.1.4 The numeric prefix before BASE in the Ethernet standards defines the speed of the cable. At the front of each identifier, 10 denote the standard data transfer speed over these media - ten megabits per second. Short for Baseband, this part of the identifier signifies a type of network that uses only one carrier frequency for signaling and requires all network stations to share its use. Lab 5.1 Review 1 Using Auto negotiation...

Words: 560 - Pages: 3