Preview

IS305

Satisfactory Essays
Open Document
Open Document
300 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
IS305
1. Nessus is a vulnerability scanner whereas NMAP is used for mapping a network’s hosts and the hosts’ open ports. Administrators log into the Nessus interface and set up policies, scans and view reports and they use NMAP to primarily detect what hosts are on the network.
2. NMAP
3. Nessus
4. You can create different policies to scan different things to see what risks you have in different departments.
5. Yes, because they can be exploited and an attacker can create a backdoor into the computer.
6. In the Nessus after scan report and it will give you recommendations on what to do to mitigate the risk.
7. The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as used in Microsoft Internet Information Services (IIS) 7.0, mod_ssl in the Apache HTTP Server 2.2.14 and earlier, OpenSSL before 0.9.8l, GnuTLS 2.8.5 and earlier, Mozilla Network Security Services (NSS) 3.12.4 and earlier, multiple Cisco products, and other products, does not properly associate renegotiation handshakes with an existing connection, which allows man-in-the-middle attackers to insert data into HTTPS sessions, and possibly other types of sessions protected by TLS or SSL, by sending an unauthenticated request that is processed retroactively by a server in a post-renegotiation context, related to a "plaintext injection" attack, aka the "Project Mogul" issue.
8. It’s a tool for practitioners because they can see what vulnerability they need to correct and patch,and it’s a hacker’s tool because it lists the vulnerability they can exploit.
9. They can set up a WSUS server that runs at certain times and holds the updates that can bring down the computer because the update hasn’t been tested yet.
10. I would define the tools needed as both give excellent information that will help safeguard the network and tell you what is needed as eliminating a lot of the risk.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    7) How does Nessus differ from ZeNmap GUI and which tool would you use for network discovery and inventory versus identifying software vulnerabilities?…

    • 486 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    I would recommend him using Nmap. Nmap is the most popular port scanner. Nmap (“Network Mapper”) is an open source utility for network exploration or security auditing. It was designed to rapidly scan large networks, although it works fine against single hosts. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (ports) they are offering, what operating system (and OS version) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. Nmap runs on most types of computers, and…

    • 443 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    ACCT 301 Week2 Homework

    • 527 Words
    • 3 Pages

    b. Risk assessment: this just means they check there controls for weaknesses regularly and fix any discrepancies with stronger controls.…

    • 527 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    4. What tasks and deliverables are needed to implement your risk mitigation recommendations? Pick one of the seven domains of a typical IT infrastructure and answer uniquely.…

    • 960 Words
    • 4 Pages
    Good Essays
  • Good Essays

    is3110 lab 1

    • 626 Words
    • 3 Pages

    How many threats and vulnerabilities did you find that impacted risk within each of the seven domains of a typical IT…

    • 626 Words
    • 3 Pages
    Good Essays
  • Good Essays

    IS3110 Lab 5

    • 610 Words
    • 3 Pages

    3. Which scanning application is better for performing a software vulnerability assessment with suggested remediation steps? Nessus…

    • 610 Words
    • 3 Pages
    Good Essays
  • Good Essays

    operating system

    • 464 Words
    • 2 Pages

    CVE listing is a dictionary of publicly known information security vulnerabilities and exposures. IT is hosted by the Office of Cybersecurity and Communications at the U.S. Department of Homeland Security…

    • 464 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Cool Paper

    • 781 Words
    • 4 Pages

    Hackers now use protocols such as the Hypertext Transfer Protocol (HTTP) to send data or commands to attack computers, making it difficult to distinguish an attack from legitimate network traffic. True or false?…

    • 781 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Unit5Dis1

    • 314 Words
    • 2 Pages

    If the applications cannot be patched or updated then alternative applications should be used and the vulnerable ones taken down. The servers should be taken down if not needed. Ensure that the servers/applications are isolated behind firewalls if they cannot be…

    • 314 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    3. Which of the following is a stand-alone malicious software program that actively transmits itself, generally over networks, to infect other computers?…

    • 339 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    The number one responsibility of the Information Assurance/Network Security Officer(s) is to maintain the best security posture for the network that is possible. This task also means that the confidentiality, availability and integrity of the system are maintained. One of the first steps towards this is to perform an assessment of the potential issues with all areas of the network. A preliminary security assessment will begin the task of identifying a list of vulnerabilities (weaknesses and flaws) that could possibly be exploited by a threat (Develop, n.d.).…

    • 1453 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Risk Assessment Lab 1

    • 741 Words
    • 5 Pages

    4. What is the risk impact or risk factor (critical, major, and minor) that you would qualitatively…

    • 741 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Case Study

    • 383 Words
    • 2 Pages

    b) In each situation make a recommendation to management o what their risk response should be…

    • 383 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Once the initial scan is done, the next phase is defining remediating actions. This involves the asset owner, security officer, and the IT department. The security officer will analyze the vulnerabilities, determine the associated risks and will provide input on…

    • 790 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Fcaps Tools

    • 5659 Words
    • 23 Pages

    . Human: where human manager defines the policy and organization approaches. Methodology: defines the architectural framework and the functions to be performed. Instrumentation: the actual operational aspects that establish the procedures, methods and algorithms for data collection, processing and reporting, and analysis of problems, their repair, prediction or forecasting of service levels and probable improvements to enhance performance. S&NM aims to provide network managers a complete view of the whole network through a visualized Network Management Tool (NMT). The International Organization for Standards (ISO) [1] has categorized five main management functions that can be managed by such tools: Fault, Configuration, Accounting, Performance, and Security (FCAPS), as simplified in Table 1. To illustrate how these functions are interrelated, an example of simple S&NM applications is shown in Fig. 1. It can be seen that a user interface is used to manage the functions, which are originated from various software, hardware, firmware, and end-users. Most of the existing S&NM systems are developed in an individual fashion, where each system is designed to operate within its own defined area or scope.s This creates a number of incompatibilities and lack of integration does not allow a common view of the system and networks to be managed. Also, this causes lack of data flows between these incompatible systems, resulting in inconsistencies of data, event correlation and maintenance of the different data bases. It may also cause many systems with low level of inter and intra communications among…

    • 5659 Words
    • 23 Pages
    Powerful Essays

Related Topics