Tuesday, December 24, 2019

is3110 lab 5 Essay - 1047 Words

IS3110 LAB 5 Identify Threats and Vulnerabilities in an IT Infrastructure 1. What are the differences between ZeNmap GUI (Nmap) and Nessus? NMAP is primarily a host detection and port discovery tool. Instead of using Nessus to look for specific vulnerabilities against a known quantity of hosts, NMAP discovers active IP hosts using a combination of probes. On the other hand Nessus takes the open ports into account and notifies you if these ports have potential security vulnerabilities attached to them. Nessus is typically installed on a server and runs as a web-based application. Nessus uses plugins to determine if a vulnerability is present on a specified machine. 2. Which scanning application is better for performing a†¦show more content†¦What is the source IP address of the Cisco Security Appliance device (refer to page 6 of the pdf report)? 192.168.0.1 7. How many IP hosts were identified in the Nessus ® vulnerability scan? List them. 8. While Nessus provides suggestions for remediation steps, what else does Nessus provide that can help you assess the risk impact of the identified software vulnerability? Through passive monitoring, PVS can reveal devices and software on the network that are not authorized, or that may indicate a network compromise. 9. Are open ports necessarily a risk? Why or why not? They are a risk because a trojan can be used to transmit data to an attacker. They hold a port open, e.g. Port 31337. The attacker connects to the trojan and sends requests to do a certain task, for example to make a screenshot. The trojan makes the screenshot and sends the image via the port to the attacker. On newer trojans, the port number is quite freely configurable, which makes identifying the trojan by the port number difficult. There are no control mechanisms available which can prevent a trojan from using an specific port. If a trojan does use the port 80, for instance, a novice user could imagine the program is a webserver, and may even simply ignore the port. 10. When you identify a known software vulnerability, where can you go to assess the risk impact of the software vulnerability? Nessus can detect thousands of problems, and it classifies each as one ofShow MoreRelatedIS3110 U7L1 Essay1064 Words   |  5 Pagesï » ¿IS3110 Lab7 Student Name: Tom Fletcher Submission Requirements Your last name must be in the filename of your submitted document according the assignment naming standard. IS3110_U7L1_Firstname_Lastname Email to: SMichnick@itt-tech.edu Due By: 6:00 PM CDT, Wednesday August 6, 2014 Note: Emails received after Due Date Due Date will be marked LATE and subject to a grade of 0 for the assignment. Please refer to Pages 46-52 of the IS3110 Student Lab Manual when working on this lab. Lab #7 – PerformRead MoreQuestions on Risk Management Controls Essay1162 Words   |  5 Pagesï » ¿IS3110 Lab Student Name: Submission Requirements Format: Microsoft Word Your last name must be in the filename of your submitted document according the assignment naming standard. IS3110_Lab2_Lastname_First Email to: SMichnick@itt-tech.edu Due By: 6:00 PM CDT, Wednesday July 2, 2014 Note: Emails received after Due Date will be marked LATE and subject to a grade penalty of 10% each week it is late. Pages 11-17 of the IS3220 Student Lab Manual Lab #2 – Align Risk, Threats, VulnerabilitiesRead MoreIS3110 U1L11092 Words   |  5 Pagesï » ¿IS3110 Lab Student Name: Submission Requirements Your last name must be in the filename of your submitted document according the assignment naming standard. IS3110_UL1_Firstname_Lastname Email to: SMichnick@itt-tech.edu Due By: 6:00 PM CDT, Wednesday June 25, 2014 Note: Emails received after Due Date Due Date will be marked LATE and subject to a grade of 0 for the assignment. Pages 3-10 of the IS3220 Student Lab Manual Lab #1 – Part A – List of Risks, Threats, and Vulnerabilities Commonly FoundRead MoreTerm Papers713 Words   |  3 PagesToussaint Chivars IS3110/Lab2 8/16/2014 Align Risks, Threats amp; Vulnerabilities to COBIT Lab 2 1. List indentified threats amp; vulnerabilities Risk Factors from Lab1 a. Unauthorized access from public Internet High risk b. User destroys data in application and deletes files High risk c. Hacker penetrates your IT infrastructure and Medium risk gains access to your internal network d. Intra-office

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.