Event Title
IT Network Risk and Security in an Enterprise System
Location
Davis 117
Start Date
30-4-2015 3:30 PM
End Date
30-4-2015 3:55 PM
Project Type
Presentation
Description
In an Enterprise Wide Area Network, or WAN, such as Colby's, there are many devices that connect to a single network. In this case, these devices connect to Colby Access. Colby Access already has an encryption protocol that requires a certificate via WPA2-Enterprise. This certificate is obtained by entering a valid Colby username and password. This certification process s an outer line of defense. However, it is not enough to simply create a wall to keep malicious activity out as these can be breached in creative and unconventional ways. Thus, a second line of defense must be in place in case a threat breaches the wall. This study focuses on Colby systems and their vulnerabilities, once a threat has entered Colby Access, by finding areas at risk to modern attacks and patching the holes on the inner wall. This decreases the overall risk to the network and more importantly, to the users on it.
Faculty Sponsor
Bruce Maxwell
Sponsoring Department
Colby College. Computer Science Dept.
CLAS Field of Study
Natural Sciences
Event Website
http://www.colby.edu/clas
ID
1779
IT Network Risk and Security in an Enterprise System
Davis 117
In an Enterprise Wide Area Network, or WAN, such as Colby's, there are many devices that connect to a single network. In this case, these devices connect to Colby Access. Colby Access already has an encryption protocol that requires a certificate via WPA2-Enterprise. This certificate is obtained by entering a valid Colby username and password. This certification process s an outer line of defense. However, it is not enough to simply create a wall to keep malicious activity out as these can be breached in creative and unconventional ways. Thus, a second line of defense must be in place in case a threat breaches the wall. This study focuses on Colby systems and their vulnerabilities, once a threat has entered Colby Access, by finding areas at risk to modern attacks and patching the holes on the inner wall. This decreases the overall risk to the network and more importantly, to the users on it.
https://digitalcommons.colby.edu/clas/2015/program/239