• Home
  • Coursework
    • Cybersecurity Fundamentals
    • Cryptography
    • Enterprise Security Architecture
    • Cybersecurity Law & Policy
    • Cybersecurity Risk Management
    • Management and Cybersecurity
    • Secure Software Design and Development
    • Network Visualization and Vulnerability Detection
    • Cyber Threat Intelligence
    • Incident Response and Computer Network Forensics
  • Reference Link Library
  • Contact
Course Summary
Network Visualization and Vulnerability Detection are two essential components of network security strategy. Visualizing a network is mapping out a network and is the first step in the overall process. Vulnerability detention is the phase where the mapped-out network is analyzed through different tools and strategies to detect anomalies. 
Implementing visualization and vulnerability detection is crucial in any organization because new network formations, such as IoT (Internet of Things), continue to expand. So the number of threats has continued to increase. Identifying and understanding the vulnerabilities associated with the new network formations is vital to reduce the risk of data breaches throughout organizations (securityscorecard.com, n.d.).
Professionally every cybersecurity practitioner must be liable to understand and implement tools and techniques in visualizing a network, as well as tools and techniques to detect vulnerabilities. 
Ethically it’s our responsibility to ensure every step in protecting information data is taken to preserve confidentiality, availability, and integrity.

​

Course Artifact
network_visualization_and_vulnerability_detection_final_paper.pdf
File Size: 954 kb
File Type: pdf
Download File

Reflections
The CSOL 570, or Network Visualization and Vulnerability Detection final project, is the perfect artifact reflecting the concept and principles of network security. It consists of constructs in comparing and selecting the tools necessary to perform network visualization and network analysis, design a basic architectural design, layout perimeter defense strategies, network monitoring, and vulnerability detection. All in all, the final project is a cohesive network security strategy (USD, n.d.).
Key insights that prompted the selection of the final project as a coursework artifact was the fact that it’s no longer adequate to build a network with high walls and wait for a siege; modern security strategies will have to focus on finding the holes within the network that could be exploited and engage in effectively patching those vulnerabilities before an attacker could take advantage of them. Network visualization and vulnerability detection tools can quickly map and assess a network for holes and show you how to prioritize and remediate flaws (Rapid7.com, n.d.).
As a professional in cybersecurity, it’s our utmost obligation to understand the importance of visualizing a network and be able to detect vulnerabilities using the tools and techniques available at our disposal.
​
Finally, our ethical obligation is to look beyond the requirements or think out of the box to secure our networks.


​

​References
Rapid7.com. (n.d.). Network Vulnerability Scanner Features & Tools. Rapid7. Retrieved April 3, 2023, from https://www.rapid7.com/solutions/network-vulnerability-scanner/
Securityscorecard. (2021, August 4). 8 Internet of Things Threats and Security Risks. SecurityScorecard. Retrieved April 3, 2023, from https://securityscorecard.com/blog/internet-of-things-threats-and-risks
USD. (n.d.). CSOL 570 - Network Visualization and Vulnerability Detection at the University of San Diego. Coursicle. Retrieved April 3, 2023, from https://www.coursicle.com/sandiego/courses/CSOL/570/
  • Home
  • Coursework
    • Cybersecurity Fundamentals
    • Cryptography
    • Enterprise Security Architecture
    • Cybersecurity Law & Policy
    • Cybersecurity Risk Management
    • Management and Cybersecurity
    • Secure Software Design and Development
    • Network Visualization and Vulnerability Detection
    • Cyber Threat Intelligence
    • Incident Response and Computer Network Forensics
  • Reference Link Library
  • Contact