Umuc Cmit 454 Spring 2019 Course Final Project Paper Grading Rub Summarized instructions: The task involves creating a comprehensive security proposal for ECU's Cisco network environment, addressing existing vulnerabilities, and recommending practical, implementable solutions. The paper must include a title page, running head, abstract, table of contents, references, and adhere to formatting standards. It should be 7-10 pages, double-spaced, with proper structure, logical flow, and integration of course literature. No CLI commands are permitted; emphasis on theory, justification, creativity, and impact. The proposal must be realistic and detailed enough to facilitate implementation and evaluation.
Paper For Above instruction The cybersecurity landscape in enterprise networks has become increasingly complex and challenging, necessitating comprehensive and strategic security proposals. This paper addresses the security concerns within the network environment of Evil Corp Unlimited (ECU), a growing organization with a modest yet expanding Cisco-based infrastructure. The proposal aims to identify vulnerabilities, recommend practical security enhancements, and outline strategies for safeguarding critical assets and ensuring continuous operational integrity. This comprehensive approach combines technical insights with procedural recommendations aligned with current best practices, ensuring the solution's feasibility and effectiveness. ECU’s network environment, characterized by its reliance on Cisco devices, presents various security gaps. These include insecure password practices, lack of logging and monitoring, unsecured remote access protocols, and insufficient firewall protections. The absence of a formal security policy exacerbates vulnerability to breaches, data compromise, and network outages. The proposal’s primary goal is to elevate security posture through multi-layered defenses, policy development, and effective operational procedures tailored to ECU’s structure and needs. This includes implementing robust access controls, deploying logging and monitoring systems, securing remote access channels, and refining network architecture to minimize exploitable points. Assessment of Current Environment The current network setup reveals significant vulnerabilities. ECU’s use of Type 7 passwords—an inherently insecure method—poses immediate risks if compromised. Insufficient logging hampers incident detection, while reliance on TELNET for device access exposes administrative sessions to interception. The lack of network device security configurations, such as authentication for OSPF, BGP, or other