Project Assignment
Project Assignment
OBJECTIVES
Assess the effectiveness of existing security measures in Safaricom's network devices.
Identify vulnerabilities within Safaricom's network infrastructure.
Recommend strategies to enhance the security posture of Safaricom's network devices.
Prioritize remediation efforts based on the severity and potential impact of vulnerabilities.
Raise security awareness among Safaricom's staff and stakeholders.
SCOPE OF THE STUDY.
The scope of the case study includes assessing security measures in Safaricom's network devices,
identifying vulnerabilities, recommending strategies for enhancement, documenting findings,
prioritizing remediation, promoting security awareness, ensuring compliance, and compiling a
concise report.
METHODOLOGY
Security testing of network devices involves a systematic approach to identifying vulnerabilities
and ensuring the robustness of network security. The following are the key methodologies and
tools that the study will employ;
Network Scanning: Network security scanning is a fundamental method to identify
vulnerabilities in a network, computer, or application by analyzing the network structure
and traffic flow.
Vulnerability Scanning: This technique involves scanning for weaknesses in network
devices, servers, and applications to detect potential security risks
Ethical Hacking: Ethical hacking, also known as penetration testing, is a proactive
approach where security experts simulate cyberattacks to uncover vulnerabilities and
assess the network's resilience
Password Cracking: Password cracking techniques are used to test the strength of
passwords within the network, identifying weak or easily compromised credentials
Tool Selection: Choosing the right tools is crucial for effective security testing. Tools
like Intruder, NMAP, Wireshark, Metasploit, Nessus, and others play a vital role in
assessing network security.
Tools and Techniques Employed in Assessment
Intruder: A powerful vulnerability scanner that identifies cybersecurity weaknesses in
network systems and aids in remediation before breaches occur
NMAP: An open-source tool used for network mapping and scanning to detect
misconfigurations and vulnerabilities
Wireshark: A network protocol analyzer supporting various protocols for in-depth
analysis of network traffic
Metasploit: A penetration testing tool used for simulating cyberattacks to identify
vulnerabilities and test defenses
Nessus: A comprehensive vulnerability assessment tool that scans networks for
weaknesses and provides detailed reports for remediation
FINDINGS
Safaricom, as a leading mobile network operator in Kenya, faces various security vulnerabilities
that can impact its operations and overall performance. The following security vulnerabilities
were identified:
a) Regulatory Changes
Safaricom operates in a dynamic regulatory environment, facing risks from significant changes
in regulations that can impact its operations and strategic initiatives. Adapting to evolving laws
and policies is crucial to mitigate potential impacts on financial performance and operations.
b) Cybersecurity Threats
In today's digital age, cybersecurity threats pose a significant risk to Safaricom's network and
services. The company is increasingly targeted by cyber threats that can lead to data breaches,
compromising customer trust and data privacy. Safaricom must remain vigilant in implementing
robust cybersecurity measures to protect its systems, infrastructure, and customer information
from unauthorized access and cyber-attacks.
c) Infrastructure Disruptions
Disruptions in Safaricom's infrastructure, including cyber-attacks, outages, equipment failures,
and natural disasters, can have adverse effects on its operations and service delivery. Safaricom's
network infrastructure, data centers, and critical facilities are vulnerable to disruptions that can
result in financial losses, service interruptions, and reputational damage. Investing in robust
infrastructure and disaster recovery measures is essential to minimize the impact of such
disruptions.
d) Supply Chain Disruptions
Safaricom relies on a complex supply chain for critical components and services required for its
operations. The company faces the risk of supply chain disruptions from third-party suppliers
and vendors due to factors like natural disasters or political instability. Proactively managing the
supply chain and establishing contingency plans are crucial to mitigate the impact of potential
disruptions on operations and profitability.