Vulnerability Assessments
There are various vulnerabilities and network security loopholes present within the organization’s network; Peer to Peer network, Netgear MR814 router, the type of cable modem used by the organization (Motorola SB3100), and Microsoft Outlook and web applications. These network security vulnerabilities present different security loopholes that can be exploited by malicious attackers to gain access to the organization's network and cause a series of unwanted effects [2]. The organization employs the use of a network topology that can be easily compromised by malicious attackers. The current peer to peer network configuration of the organization’s system presents a ...