Retrieved from https://studentshare.org/information-technology/1660644-unit-3-discussion-cis-204
https://studentshare.org/information-technology/1660644-unit-3-discussion-cis-204.
Computer Case Study Institute Since it is a lunch meeting, I need to be brief. I would ask them about the last time they updated their firewall firmware. I would further like to know how often there is a security breach at this small local company. Knowledge about missing updates on their servers and PCs would be crucial at this point. Before going to the site, I would like to know if they have a secure backup for their data. Since it is a lunch meeting it would be highly improbable for them to be carrying the flowchart or any documentation of their network, but I would still inquire about that.
Lastly, I would ask them if they have WEP encryption because this is highly vulnerable to attack. 2. There are many things that can be arranged for securing the routers but in such a short time I would; disable remote access, update the firmware and change the default login credentials.3. If the company invites me again, I will lock down Wi-Fi access. This will prevent an outsider from tampering with the router. Disabling UPnP is also an option for the same purpose. After the configuration, I would also log out from the router’s web interface.
This process will prevent cross site scripting flaws (XSS). After doing these procedures I would go back to the basics; I would ensure that the routers are password protected both in the login mode and privileged mode.
Read More