Cisco’s network system infrastructure is: • Network fabrics –

     Cisco’s Systems, Inc. mission is to “shape
the future of the Internet by creating unprecedented value and opportunity for their
clients, employees, investors, and ecosystem partners.”  By changing the way, we Work, Live, Play, and
Learn.

     Cisco’s Systems, Inc. was founded in December
the year of 1984 in San Francisco, California their Q4 FY’16 Revenue is $12.6
Billion.  The Q4 FY’16 Employee Count is
73,711.  Cisco’s Systems,
Inc. is the leader of Information Technology (IT) by helping organization to
take hold of their futures using their Digital Network Architecture (DNA)
network system and providing them with solutions as their
needs are identified using the multi-protocol router, which was
designed by Leonard Bosack and Sandy Lerner.

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!


order now

  Cisco offers cloud-based services based on
Cisco’s virtualized Unified Computing System (UCS).  A part of the Cisco Unified Services Delivery
Solution that includes hosted versions of Cisco Unified Communications Manager
(UCM. Cisco maintains several Network Emergency Response Vehicles (NERV)s.  Cisco’s Linksys E2700, E3500, E4500 devices
have been reported to be remotely updated to a firmware version that forces
users to register for a cloud service, allows Cisco to monitor their network
use and ultimately shut down the cloud service account and thus render the
affected router unusable.  Cisco’s also
has a Firewall backdoor that was developed by the National Security Agency (NSA).

     Cisco’s Systems, Inc. is now the “leader worldwide
in networking – transforming how people connect, communicate, and collaborate.”  (Cisco 2017)

 

 

 

Overview of Network and Existing Security

     The Cisco Systems, Inc. Digital
Network Architecture (DNA) network system as a:

SENSOR

ENFORCER


Stealthwatch

Identity Services Engine


SD-Access

TrustSec

D-Access

Next-Generation Firewalls

Umbrella

Router security

 

 

 

 

 

 

 

     The Digital
Network Architecture (DNA) network system is designed to connect to the
network and transmit the flow of the Internet Protocol (IP) address that
crosses a User Network Interface (UNI).  The
Digital Network Architecture (DNA) network system infrastructure
is:

     • Network fabrics – Any–to–Any network

     • Virtualization –  the separation of traffic by means of Virtual
Local Area Network (VLAN)s

        or Virtual Routing and Forwarding (VRF)

     • Cloud exchange – provides resources to
host the digitized applications for the organization.

     • Network controller – oversees all the
configurations and operations of its network elements.

     • Service definition and orchestration – enhances
the concept of network abstraction.

     • Analytics and telemetry applications – Data
Collection, Data Analysis, and Feedback and

        Control

 

 

 

 

     The Cisco Systems, Inc. helps the
organization to reduce their Total Cost of ownership (TCO), with their network
insights.

     The Cisco Systems, Inc. has
not released a software that prevents a security attacker from exploiting the Virtual
Topology System (VTS) devices Transmission Control Protocol (TCP) Connection
Functionality Denial of Service Vulnerability traffic stream.

CISCO’S
SYSTEMS, INC. PROTOCOLS ALLOWED


Protocols allowed to pass ASA

Internet Protocols – DocWiki

Bug ID: CSCeb08966 – unassigned/reserved protocols allowed for
protocol-object in CLI

Open System Interconnection Protocols – DocWiki

Introduction to LAN Protocols – DocWiki    


Open System Interconnection Protocols – DocWiki  

 

     The Cisco Systems,
Inc. uses the Internet Service Provider (ISP) 120924
connection method.  The Cisco Systems, Inc. network equipment is the Catalyst
9300 Series Switches.  The number of products
such as routers and another network equipment that is used by the Cisco Systems,
Inc. totals up to 8244.

     The Cisco Systems, Inc. Security Device
Manager (SDM) helps to simply the router and security configuration through
there intelligent wizards letting their clients access to deploy, configure,
and monitor very quickly and easily the router without
having knowledge of the Cisco Systems, Inc. Internetwork Operating System (IOS)
Software Command-Line Interface (CLI).

REMOTE
ACCESS 831 ROUTER SERIES

DEVICE

VENDOR

DESCRIPTION

831
Ethernet Broadband Router (CISCO831-K9-64)

Amazon
and eBay

     Dual Ethernet Security Router

831
RTR

Amazon
and eBay

     Displays debugging information about
EIGRP service.

831
Router

Amazon
and eBay

     Provides connection to 10/100BASE-T
(10/100-Mbps) Ethernet networks. Compatible with 10/100-Mbps devices.

831
800A Series 4 Port Router – No AC Adapter

Amazon
and eBay

     Provides a 4-port Ethernet switch for
the Local Area Network (LAN) and the Wide Area Network (WAN) ports.

 

 

 

 

 

 

 

 

 

Risk Assessment

(Inventory
of Devices)

     Cisco System, Inc. is valued at $500 billion
in the market capitalization.  With its
multimillion dollars’ worth of inventory included.  If a security attack should
occur through its Operating System, Cisco System, Inc. stands to lose it all.

     To help with the security of Cisco System,
Inc. the risk assessment that can be used is a four (4) layer method the: 

     • Discovery

     • Device Profiling

     • Device Profiling

     • Validation

     This method covers every end-to-end point of
the operating system.

CISCO’s INVENTORY

Collaboration Solutions
Analyzer
Packet Capture Config
Generator and Analyzer
Wireless Debug Analyzer
Software Research
Device Coverage Checker
Firewall Configuration
Conversion Tool
MIB Locator
DSP Calculator
Cisco Notification
Service
Special File Access
Service Order RMA Tool
Diagnostic Signatures
Lookup Tool
Collaboration Solutions
Analyzer
Access List Checker
Cisco UCS Advanced
TCO/ROI Advisor R3
Dialed Number Analyzer
for CUBE
Wireless Config
Converter
Catalyst 4500 CPU
Packet Buffer Parser
NXOS Log Finder
Configuration Diff
Packet Capture Config
Generator and Analyzer
Route Summary Tool
VCS service checker
(Integrated on Collaboration Solution Analyzer)
IPsec Lan-to-Lan
Configuration Checker
SIPp XML Generator for
IOS
My Devices
Cisco CLI Analyzer
IPSec Overhead
Calculator
Wireless Debug Analyzer
Product Approval Status
Support Case Manager
SIP Profile Tester for
CUBE and SIP Gateways
Voice Debug Lookup
UCS Sizing tool
Cisco Commerce
Workspace
Cisco IOS to NXOS
Configuration Converter
Cisco Power Calculator
Cisco TelePresence
Interoperability Database
Cisco SmartAdvisor
Bug Search Tool
Cisco Feature Navigator
Voice Codec Bandwidth
Calculator
IP Subnet Calculator
Cisco Unified Computing
System TCO-ROI Advisor
Download Software
Product License
Registration
Product Upgrade Tool
SNMP Object Navigator

 

 

 

 

CISCO’s
SYSTEMS INC. ASSETS

PRODUCTS

DESKTOPS

LAPTOPS

NETWORK
PRINTERS

SERVERS

44

100

100

7

10

 

     Cisco Systems Inc’s total Products inventories
for 2017 is list as a $1,655 Million Incorporation:

    
• Cisco Systems Inc’s Desktops sells for $459.99 to $2,385.99

     • Cisco Systems Inc’s Laptops sells for
$263.99 to $4,000.00

    
• Cisco Systems Inc’s Network Printers sells for $159.99 to $199.99

     • Cisco Systems Inc’s Servers sells for $749.99
to $18,600.00

    

 

 

 

 

 

 

CISCO’s SYSTEMS INC.
FINANCIAL ASSETS REPORT

     The personal information of the Cisco’s
employees, client’s information, corporate information, intellectual property,
and infrastructure is at risk due to it high value of internet usage.  A security attacker is always looking for
that one open space to steal organizations personal data.  Cisco System Inc. protects these critical
assets through the Functionally-Capable Operationally-Reliable
Regulatory-Compliant Secure (FORS) Model

 

 

 

 

 

 

 

 

 

     Based on the identification of a natural disaster
Cisco’s Tactical Operations (TacOps) Team prioritizes
the functions
based on their relative importance to organizations operations.  By evaluating the risks attributes
such as, Downtime, Cost of lost opportunities, the Spilling of several gallons
of toxic liquid, the Time and Cost taken to clean up the area etc.

CISCO’s
SYSTEM INC.  RISK ATTRIBUTES DIAGRAM

 

 

 

 

 

 

 

     The Cisco Cyber Security Incident Response
Team (CSIRT) identify which internal assets first such as the communications
between networks and then the external assets such as the desktops that has
been compromised during a security attack.

 

 

 

 

 

     • Preparation
– of all activities before an incident occurs.

     • Detection
and Analysis – to see if there’s an incident and the
scope of the impact.

     • Containment
– the actions to any incident.

     • Eradication
and Recovery – makes sure that there is no infection left
on the systems.

     • Post-Incident
Activity – after all activity are phase is completed.

 

CISCO’s
TACTICAL OPERATIONS (TacOps) TEAM

EMERGENCY
COMMUNICATIONS KIT (ECK)

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Security Architecture Plan

(Identify
and Select Appropriate Technologies)

     When creating a Security
Architecture Plan the organization should keep in mind the Predictive and
Preventive Security measures of a potential security attack and designing a Security
Architecture Plan that cover the Open Systems
Interconnect (OSI) model seven (7) layers:

     • Application Layer 7

     • Presentation Layer
6

     • Session Layer 5

     • Transport Layer 4

     • Network Layer 3

     • Data Link Layer 2

     • Physical Layer 1

     • Securing the Domain Name System (DNS) will help keep the Application Layer section of

        the Open Systems Interconnect (OSI)
model secured.

    
• separating the users input from the program control functions will
help keep the

        Presentation
Layer section
of the Open Systems Interconnect (OSI) model secured.

     • In the Session Layer of the Open Systems Interconnect (OSI) model the password
exchange

        and storage must be encrypted, to help with the
security of the Open Systems Interconnect

        (OSI) model.

     • Ensuring that the correct firewall implementation
is in place will help keep the Transport

        Layer
section of the Open
Systems Interconnect (OSI) model secured.

     • The firewalls must be configured
correctly and properly to help keep the Network

        Layer
section of the Open
Systems Interconnect (OSI) model secured.

     • Making sure of the Authentication and Encryption
of the Media Access Control (MAC)

        address will help keep the Data Link Layer section of the Open Systems
Interconnect

        (OSI) model secured.

     • Authentication of the Bio-Metric Solutions
will help keep the Physical Layer section of

        the Open Systems Interconnect (OSI)
model secured.  (2017,
Checkmarx Ltd)

 

 

 

 

 

 

 

 

 

     Cisco’s Smart Collector Security come in
both the prepackaged hardware appliance and the software appliance it provides
security for the organization’s Hardware and Software that monitors the
organizations:

     • Unsuccessful login attempts

     • Secure connectivity or cryptographic
processing errors

     • Policy configuration changes

     • Collector subsystems status, like local
database and file system

     • Data access from collector user accounts

     • Successful transmission of information
to the Cisco Data Center

     Also with the Cisco’s
Smart Collector software IP Addresses, hostnames, and Data
storage are kept confidential.  Cisco’s
Smart Collector Software Secures the organization’s Discovery, Collection,
and Transmission of data. Identifying relevant Alerts and Advisories for the
affected Open Systems Interconnect (OSI) model. 
While providing Automated Installed Base and Contract Management Functionality,
up-to-date Maintains installed base data.

 

     Cisco’s Smart Collector identifies the Open
Systems Interconnect (OSI) model on the organizations Operating System (OS) and
collects the Product Identifiers (PID), Serial Numbers, Internetwork Operating
System (IOS) releases, Operating System (OS) version number, Host
Name, IP Address, installed Memory, and Firmware version number are collected
with the intent of providing a richer insight into the final report.

     Cisco’s Smart Collector uses three (3)
measures
of security controls to help with the in mitigating risks:

     • “All sensitive device passwords
credentials are masked during transport.

     • Transferred data is encrypted at the
application layer using a PKI-based 128-bit AES key

        generated per data upload.

     • The AES key is also encrypted with a public
key generated by Cisco – the encrypted data

        plus, the encrypted 128-bit key is
signed using the private key generated at installation to

        form a digital signature.”  (Palma, 2017)

x

Hi!
I'm Joan!

Would you like to get a custom essay? How about receiving a customized one?

Check it out