Interpretations of the nessus report and recommendations

Assignment Help Basic Computer Science
Reference no: EM131218090

Consider the following scenario: You are a new security administrator in the credit card division of a multinational bank. Your division deals with personally identifiable information of the bank's cardholders. To comply with regulations on personally identifiable information, you need to perform monthly network vulnerability scans. The previous security administrator ran frequent vulnerability scans, but had a hard time getting anyone to address the findings. You plan to develop a process for monthly scanning and remediation, including how to handle exceptions when the report shows a false positive or when the business needs more time to address an issue. You have a copy of the latest vulnerability report. Refer to the "Nessus Full Network Scan, Detailed Findings" web resource from the Learning Resources. The report lists server names, vulnerabilities, and the severity of these vulnerabilities. Each vulnerability has an associated Common Vulnerabilities and Exposures (CVE) number. Refer to the Common Vulnerabilities and Exposures website  which explains the vulnerabilities in depth.

For this Assignment, write a 4- to 6-page paper that summarizes your interpretations of the Nessus report and your recommendations to address the reported vulnerabilities. Cover the following points in your paper:

  • Follow the links for the vulnerabilities categorized as high and briefly explain what is involved in remediation of each.
  • Explain, based on your readings, why sometimes vulnerabilities need to be addressed by changes to the OS configuration (OS hardening) and why not every vulnerability can be quickly remediated with a patch or upgrade.
  • Outline a process for monthly vulnerability scanning, review, and remediation. Explain the significance of each step in this workflow.

Reference no: EM131218090

Questions Cloud

What is the total storage capacity of disk : You have a hard drive with 16,384 cylinders, 16 heads, and 63 sectors per track. What is the total storage capacity of this disk?
What are your next steps about cyber bullying message : While reviewing the email messages in your email account, you notice one that you interpret as cyberbullying. you do not recognize the sender of the email message, but still take it seriously. what are your next steps?
What is the total storage capacity of disk : You have a hard drive with 16,384 cylinders, 16 heads, and 63 sectors per track. What is the total storage capacity of this disk?
What are the advantages and disadvantages of the strategy : The three partners of an international joint venture, located in the Asian country of one of the partners, are locked in a profit distribution dispute that repeated negotiations between the partners have failed to resolve. They are beginning to th..
Interpretations of the nessus report and recommendations : For this Assignment, write a 4- to 6-page paper that summarizes your interpretations of the Nessus report and your recommendations to address the reported vulnerabilities. Cover the following points in your paper:
Prepare two to three paragraph summary of the given article : Create a mind map, and write a two to three paragraph summary of the article that includes three questions for the class and a hyperlink to the original current event article.
Java application that assigns hourly wages to employees : Write a Java application that assigns hourly wages to employees. Create an EmployeeException class whose constructor receives a String that consists of an employee ID and pay rate.
Why have developed economy firms not taken this ibs approach : Unrelated product diversification (conglomeration) is widely discredited in developed economies; however, in some cases it appears to add value in emerging economies. Is this interest in conglomeration likely to hold or decrease in emerging econom..
Problem regarding the flash memory cards : 1) Using your book and the Internet, please explain the following Flash Memory Cards:

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Industrial applications of electrical engineering technology

1. What are some industrial applications of Electrical Engineering Technology? 2. Can Scratch program can be used as tool to prototype ideas in software applications? 3. Is SuperConductivity when we have temperatures near some very low temperatures?

  Letters of the word leading

In how many diferent ways can the letters of the word 'LEADING' be arranged in such a way that the vowels always come together?

  Explain nested join

Explain Nested Join, Hash Join, and Merge Join in SQL Query Plan.

  Propose a solution that maintains existing software

Propose a solution that maintains existing software in each department and is supported by the HL7 initiatives.

  Discuss how the it department helps the organization achieve

Discuss how the IT department helps the organization achieve their strategic goals

  Advantages of the database approach

What are the advantages of the database approach over the traditional approach to database management? What is a data center, and why are they becoming increasingly important

  Write program that prompts user to pick either seat or price

Write a program that prompts users to pick either a seat or a price. Mark sold seats by changing the price to 0. When a user specifies a seat, make sure it is available.

  The command sequence in a normal smtp session

1.What would the command sequence in a normal SMTP session be? Use C: to preface a command issued by the client and S: to preface a command issued by the server.

  Social policy and debate regarding children and technology

See Supreme Court Rules for more information. If Winner's three guiding maxims were utilized, how would this influence social policy and debate regarding children and technology?

  Securing owa

In order to effectively implement Outlook Web Access (OWA) and allow employees to have seamless access to email, you must provide external access to users. This, of course, creates a security weakness in your network because of open ports. Your senio..

  Role and relationship between the entities

Define the terms entity, attribute, role and relationship between the entities, giving examples for each of them.

  What are the advantages to using the loop instruction

What are the advantages in using the WHILE instruction to set up a count-controlled loop?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd