INFORMATION TECHNOLOGY RISK ASSESSMENT 3
executed at this stage, it is important to consider network baselining and workstation host system
baseline.
Network Baseline
When baselining a network, there are certainly various areas to look and examine. Some
include visual and physical inspection of the hardware. Others are done through rudimental
bandwidth statistics which in some way prove very crucial in recognizing possible latency issues
(Rezvani, 2018). This involves checking whether the network devices are well connected and
placed in a location that cannot be tampered physically. It is essential to ensure that the quality
and size of the cables are adequate for the length of the run. Additionally, it is important to make
sure that there is adequate power to the devices. This involves checking if the UPS or rather the
power strips are used or shared (Underwood, Stryker, & Peterson, 2017). Another thing of
importance is the Host enumeration, where one determines the number and the type of host that
is connected to the network. The types of tools that can be used for enumeration include Nmap,
Amap, LAN-Guard, and Nessus (Rezvani, 2018). After this, one has to check at both the Hubs
and Firewalls configuration. To sum up the physical assessment, it would be crucial to check the
traffic pattern of the network. This will involve observing both the high and low usage of the
network.
Workstation Host System Baseline
Hosts are considered the most important devices that are found on a network and are the
primary productivity instrument for all the end users. Apparently, these are the most vulnerable
section since the process of daily utilization of a workstation involves shared files, messaging,
streaming, printing, and internet surfing (Underwood, Stryker, & Peterson, 2017). With this kind
of disclosure to potential traffic, there is a need of having a good understanding of the normal
workings of the workstation as it is the only way of detecting any anomalous behaviors in a