Open Access. Powered by Scholars. Published by Universities.®

OS and Networks Commons

Open Access. Powered by Scholars. Published by Universities.®

Routing

2021

Articles 1 - 1 of 1

Full-Text Articles in OS and Networks

Preforming A Vulnerability Assessment On A Secured Network, Mathias Sovine Jan 2021

Preforming A Vulnerability Assessment On A Secured Network, Mathias Sovine

Williams Honors College, Honors Research Projects

A computer network will be built using 3 routers, 1 switch, and 4 computers. The network will be used to simulate the connections between an at home office and the internet. The network will be divided into 3 sub-networks. The routers will be secured using methods like access control lists, changing default admin passwords, and network encryption. The switch will be secured using methods like switchport security and setting access passwords. Once the network is secured, three penetration testing techniques and three exploits will be performed on the network. The results of the exploits and penetration testing techniques will be …