It a firewall (Sekhon & Garg, 2015).

Itis evident that Sifers-Grayson is having several vulnerabilities in theirnetwork.

The red team did several tests on the company network and theysuccessfully identified vulnerabilities that must be mitigated moving forward. Thered team found out these vulnerabilities by performing several tests whichincluded: Accessing the R&D servers via a backdoor. They utilized an unprotectednetwork connection which never had a firewall protection. This meant that amalicious hacker was able to access the R&D servers and get away with classifiedinformation which was used to perform research and create product designs inthe organization (Cerdeiro, Dziubi?ski& Goyal, 2015).

Theread team also made use of stolen user account information to find their wayinto the workstations and install malware. For this reason, workstationsconnected to the PROM burner in the R&D DevOps lab. Movingforward, Sifers-Grayson needs to implement various security measures andpolicies in order to avoid any data breach or attacks in the future.  First, all the workstation users (employees) `needto be trained and informed on how to make strong passwords that can never beguessed. The entire Sifers-Grayson network further needs to be secured with afirewall (Sekhon & Garg, 2015).This will ensure that the R&D servers are always protected by a firewalland can never be accessed through the back door. The latest encryptiontechnologies must be utilized to ensure that all the data in transit even whenintercepted by intruders can never be usable (Daemen & Rijmen, 2013).

Thecompany must also design a backup network and data backups to ensure that criticalinformation can never be completely lost even when the original database iscompromised. Furthermore, an incidence response team having experienced IT personnelneeds to be set up so that they will at all times be alert to find unusualactivity within Sifers-Grayson network and systems.