Network Risk Assessment
“A computer’s network devices are the units that exchange data to a computer network. The units are sometimes referred to as network equipment. There are several tools that constitute the network devices” (Easttom, 2006). The hub connects computers together in a star network. A repeater is another tool that receives signals and transmits it at a higher or stronger power so that the signal can cover wider range.
There are tools that can be used to discover and monitor robust network devices. However, the discovery of devices can take several hours for the process to be completed discovery tools should be created so that each time they are run, new devices within the definition of the rules will be discovered. Depending on the number of the management server, each management server should run one discovery tool.
One of the most crucial steps, which is always overlooked is making sure that the cables are properly connected. Moreover, the computer, router, modem and all other devices should be rebooted. It may not be seen as an important step but sometimes, the network devices are not discoverable because of connection issues (Easttom, 2006).
Several tools are available on the market that can assist in device discovery. In Windows operating system, the command prompt can handle the process. The ping command can offer the discovery solution. It is usually used to send an echo request to a given IP address. When the device contacted can reply, it will send an echo response. For example, when you want to discover to a printer of IP address 192.168.1.101, then the command ping 192.1681.101 will be entered in the command prompt window (Easttom, 2006).
Sometimes one do not know the address of a particular device that they want to find. However, the ping command can support a broadcast option, where the command will send a ping to every device on the network. The requirements of using the command are to have the network’s IP address setup and the subnet mask value, which can all be found in the Network control panel (Easttom, 2006)..
The advanced IP scanner is another tool that can quickly retrieve information of a network. The utility can be used to access various resources such as HTTPS, HTTP, RDP, FTP, Radmin and shared folder. The tool has been known to be used by system administrators to monitor and manage their network. It can display the number of devices, sorting them in the number of devices which are alive, dead and also if it unknown.
Easttom (2006) explains that a threat is anything that endangers the assets of an organization. There are physical threats that can harm the devices of a network, and an attacker can take advantage of the loopholes such as poorly configured network devices to exploit the devices. Countermeasures are the actions that will prevent the devices vulnerability, and they are of different types.
“Administrative countermeasures concern with the general procedure of a network, security policies, and the accepted safety guidelines” (Easttom, 2006). Physical countermeasures can range from the physical security of the server rooms, devices of the network, data center and prevention against accident and fire. Making sure that the power supply is uninterrupted also another form of physical countermeasures. Logical countermeasures range from a proper configuration of network firewalls, operation and operation systems password security and also the security of Intrusion Prevention Systems (IPS) and Virtual Private Network (VPN).
Easttom, C. (2006). Network defense and countermeasures: Principles and practices. Upper Saddle River, N.J: Pearson Prentice Hall.
Shelly, G. B., Cashman, T. J., & Vermaat, M. (2007). Discovering computers: Fundamentals. Boston, Mass: Thomson Course Technology.