An Indiana company conducts genetic research on plants. The IT manager of the company contacted us for assistance in looking into the security of their network. They already had another company that was performing monthly checks on their network. Research was done to find how that company gained access to the network to ensure safe practices. Risk assessment and vulnerability software was researched and used to perform scans of the company’s network. After the scans were completed and enough information was gathered, a report was created with a list of risks, vulnerabilities, and recommendations. In closing this project, the report was presented to the IT manager of the company.

Student Team Members: Lindsay Friddle, Kevin Wikman

Author