Event Title

IT Network Risk and Security in an Enterprise System

Presenter Information

Andrew Dengler, Colby CollegeFollow

Location

Davis 117

Start Date

30-4-2015 3:30 PM

End Date

30-4-2015 3:55 PM

Project Type

Presentation

Description

In an Enterprise Wide Area Network, or WAN, such as Colby's, there are many devices that connect to a single network. In this case, these devices connect to Colby Access. Colby Access already has an encryption protocol that requires a certificate via WPA2-Enterprise. This certificate is obtained by entering a valid Colby username and password. This certification process s an outer line of defense. However, it is not enough to simply create a wall to keep malicious activity out as these can be breached in creative and unconventional ways. Thus, a second line of defense must be in place in case a threat breaches the wall. This study focuses on Colby systems and their vulnerabilities, once a threat has entered Colby Access, by finding areas at risk to modern attacks and patching the holes on the inner wall. This decreases the overall risk to the network and more importantly, to the users on it.

Faculty Sponsor

Bruce Maxwell

Sponsoring Department

Colby College. Computer Science Dept.

CLAS Field of Study

Natural Sciences

Event Website

http://www.colby.edu/clas

ID

1779

Share

COinS
 
Apr 30th, 3:30 PM Apr 30th, 3:55 PM

IT Network Risk and Security in an Enterprise System

Davis 117

In an Enterprise Wide Area Network, or WAN, such as Colby's, there are many devices that connect to a single network. In this case, these devices connect to Colby Access. Colby Access already has an encryption protocol that requires a certificate via WPA2-Enterprise. This certificate is obtained by entering a valid Colby username and password. This certification process s an outer line of defense. However, it is not enough to simply create a wall to keep malicious activity out as these can be breached in creative and unconventional ways. Thus, a second line of defense must be in place in case a threat breaches the wall. This study focuses on Colby systems and their vulnerabilities, once a threat has entered Colby Access, by finding areas at risk to modern attacks and patching the holes on the inner wall. This decreases the overall risk to the network and more importantly, to the users on it.

http://digitalcommons.colby.edu/clas/2015/program/239