NETWORK DESIGN (- D482)
GRADED TO SCORE A+
D482
Evatee 8/12/24 WGU D482
, WGU D482 TASK 1 (SECURE NETWORK DESIGN
(- D482) GRADED TO SCORE A+
Task 1
Martin Whitcomb
Student ID:
000767423
Company A has identi 昀椀 ed multiple network and infrastructure vulnerabilities. Identi 昀椀 ed
network security vulnerabilities include all network users have local administrative
privileges and use only eight-character passwords. Hardware vulnerabilities are end of life
equipment being utilized as well as open port 3389.
Users having local administrative privileges is a network security issue. Allowing all users to
have this level of privilege has a moderate vulnerability risk. Company A should deploy the
concept of least privilege to mitigate the likelihood of nefarious actors accessing the company
network. “The Principle of Least Privilege (POLP) is widely recognized as a security concept
that enforces giving an identity (a person or machine identity) only the permissions that are
essential to performing its intended function. If an identity does not need the authorization,
they should not possess it. It is implemented to minimize the cloud attack surface and protect
data by mitigating the number of ploitation via permissions.” (Shea, Tally, (2023, November
30). What’s Least Privilege? How to Implement & Stay There. Retrieved from
https://sonraisecurity.com/blog/principle-least-privilege/ ).
The requirement that users only use eight-character passwords is another Company A
vulnerability and is considered a high likelihood risk. A recent study has found that an eight-
character password only takes approximately 昀椀 ve minutes to crack. (Whitney, Lance, (2023,
August 7). How an 8-Character Password Could be Cracked in Just a Few Minutes. Retrieved
from https://e-cracked-in-less-than-an-hour/). “Security experts keep advising us to
create strong and complex passwords to protect our online accounts and data from savvy