Jacob Woodfield
SID: 3098774
350CT Coursework
Part A: Secure Network Design
Introduction
Dear XYZ Ltd.,
My name is Jacob Woodfield and I am writing to you on behalf of Coventry Security Solutions, with whom you recently made contact with to request a security audit of your computer systems.
Firstly, I would like to congratulate you on a very wise choice in deciding to have a security audit take place of your company. Last year 87% of small businesses had a security breach, which is up from
76% in 2012. The median number of these breaches suffered rested at 17 in 2013, which is up from
6 in 2012 (PWC, 2013). This goes to show that cyber-security is becoming increasingly important and with XYZ Ltd making such phenomenal financial improvements, now is the time to take preventative action. Please find attached a detailed report which I have compiled, based on all of the information made available to me. I have made some educated assumptions in regards to some security issues (one such assumption is that it is unlikely that you are using a high enough level of security on your WiFi connections), but the advice in these situations is fairly generic and only serves to reiterate that these security solutions are the most effective option.
I have simplified terminology for the sake of readability in this report. As a result of this, if you have any more specific technical queries regarding this report, please don 't hesitate to contact me via email at jwoodfield91@gmail.com. I aim to reply to all emails within 24 hours, but this might take longer depending on the level of detail required for your response.
Thank you for choosing Coventry Security Solutions for this security audit and we hope that you will stick with us for further analysis and security implementation.
Yours Sincerely,
Jacob Woodfield,
Senior Security Consultant
1
350CT
Jacob Woodfield
SID: 3098774
Table of Contents
Contents
Introduction
References: CVE. (2011, August 19). CVE-2011-3192. Retrieved from CVE: http://cve.mitre.org/cgibin/cvename.cgi?name=CVE-2011-3192 e.wiZzl execution: February 11, 2014. Retrieved from Support.microsoft.com: https://support.microsoft.com/kb/2912390 This section of the coursework’s practical activities were achieved in group exercises with Kieran Mitchell (SID: 3833164) and Lauchlan Wyndham-Birch (SID: 3725010).