Network Visualization and Vulnerability Detection (CSOL 570)
Introduction
Computer networks are crucial infrastructure for handling a large amount
of data traffic within an organization and over the internet. Each computer
within the network is capable of complex communication, and when left
unchecked, can create an onramp for cybercriminals. The most effective way to
manage the network complexities is to start with a network visualization map. It
will often help you visualize where your infrastructure is lacking and what
needs to be upgraded/replaced. Having an adequately documented schematic of
your entire network and connections can also ensure you can troubleshoot issues
in a systematic order when they arise
Below is the final class project where I created a
virtualized environment and ran multiple security tools, including scanners
mapping my entired wired and wireless network
topology.
Coursework
Reflection
When a large amount of data is stored and transferred over a network,
graphs and charts help the reader understand its meaning quickly. Graphs and
charts can connect link critical data points revealing trends in seconds. The
ability to visualize large amounts of data at a glance could mean the
difference between a successful attack or stopping it. Weaknesses in network
protocols are complicated when system administrators and users have limited
knowledge of the networking infrastructure
There are a large amount of data traveling through even the smallest of
computer networks. The more devices that exist on the network, the larger the
data flow through the web. Communication protocols direct data flow over the
different layers of the OSI (Open System Interconnection) model. The Open
Systems Interconnection (OSI) model describes seven computer systems' seven
layers communicate over a network
References
Avast.com. (2021). How do TCP and IP differ? Retrieved
from https://www.avast.com: https://www.avast.com/c-what-is-tcp-ip
CompTIA. (2021). What Is a Network Protocol, and How Does
It Work? Retrieved from https://www.comptia.org/:
https://www.comptia.org/content/guides/what-is-a-network-protocol
CyberVista. (2018). Ethical Hacking Tools You Should Use.
Retrieved from https://certify.cybervista.net:
https://certify.cybervista.net/ethical-hacking-tools-you-should-use/
Parker, J. (2021). Top 11 Network Diagram, Topology &
Mapping Software. Retrieved from https://www.pcwdld.com/:
https://www.pcwdld.com/top-10-network-diagram-topology-and-mapping-software#wbounce-modal
Porup, J. (2018). What is Wireshark? What this essential
troubleshooting tool does and how to use it. Retrieved from
https://www.csoonline.com/:
https://www.csoonline.com/article/3305805/what-is-wireshark-what-this-essential-troubleshooting-tool-does-and-how-to-use-it.html
CHAPMAN, C. (2021). A Complete Overview of the
Best Data Visualization Tools. Retrieved from https://www.toptal.com:
https://www.toptal.com/designers/data-visualization/data-visualization-tools
Imperva. (2021). OSI Model. Retrieved from
https://www.imperva.com:
https://www.imperva.com/learn/application-security/osi-model/
JulianJang-Jaccard, S. (2014). A survey of emerging
threats in cybersecurity. Retrieved from https://www.sciencedirect.com:
https://www.sciencedirect.com/science/article/pii/S0022000014000178