Network Visualization and Vulnerability Detection
The growth of the Internet has led to information networks being connected around the globe. The ability to access any system or data set from anywhere on earth or even in space has led to an increasingly connected world. It has also let to systems and networks being much more vulnerable to bad actors looking to exploit those connections. As a security professional, it is important that I understand how vulnerabilities are uncovered and exploited to be able to protect the organizations I work for. The following paper describes a full vulnerability scan, an evaluation of identified weaknesses, and steps taken to uncover all of this information.
Reflections
I came into this program with a deep background in networking and data communications. This class added to my tool belt and gave me a greater understanding of the importance of knowing what is going on in an organization's network and systems. I was able to uncover weaknesses not only in systems but also in how I approached securing those networks. Any change in software or system architecture can bring about new vulnerabilities. Strong ethics are necessary to perform the rigorous testing and evaluation of these changes and to work with teams to close any identified vulnerabilities. As I move forward in my career, I will do well to apply the lessons learned here to ensure the operations of the organization remain secure.