What are first five open ports as identified by zenmap scan

Assignment Help Computer Engineering
Reference no: EM133473261

Assignment: Cyberlaws and Ethical Hacking Project

Length: 2 to 4 pages.

Project: Identify Vulnerabilities in IT Security

Scenario

Aim Higher College has been the target of focused attacks from a variety of attackers. Your manager has assigned you the task to review the port and vulnerability scan data recently gathered from a typical system to determine what ports and services are exposed to attackers, and what vulnerabilities exist on that system.

Required Resources

1. Access to the Internet
2. Text sheet: Zenmap Intense Scan Results (ts_zenmapscan)

Tasks

Question I. Analyze the results of the Zenmap scan. Your report must answer the following questions:

1. What are the first five open ports as identified by the Zenmap scan?
2. Include the port number
3. Include the service name
4. Include a brief description of how each is used

Question II. The Nessus scan identified two critical vulnerabilities, identified as ID 32314 and ID 33850.

1. Research the vulnerabilities against the Common Vulnerabilities and Exposure (CVE)database.

2. Include the name and a brief description of each vulnerability.

Question III. Determine what can be done to protect the system and defend the campus network againstattempts to gather data, and to resolve vulnerabilities. Also determine which ports and services likely need to remain open.

Question IV. Write a report targeted at IT management and systems administration staff explaining thevulnerabilities and protection mechanisms that Aim Higher College should adopt, which will be applied to all similar systems at the college.

Reference no: EM133473261

Questions Cloud

Modes of transportation would they most likely use : What mode or modes of transportation would they most likely use? Draw on Rawls, be specific, and speculate with an imagination informed by the historical record
Responsibilities of the director of adult prisons : What are the duties and responsibilities of the Director of Adult Prisons?
Discuss relationship between policy and clinical practice : Discuss the relationship between policy and clinical practice? Can you think of an example of how this has impacted on Advanced Nursing Practice.
How did women fare in the new south : How did women fare in the New South How did a Southern woman's race/ethnicity and class determine her experience
What are first five open ports as identified by zenmap scan : What are the first five open ports as identified by the Zenmap scan? Determine what can be done to protect the system and defend campus network againstattempts.
Promote stigmatization to end rape as a tactic of warfare : We covered rape in armed conflicts. In your educated opinion, what do you think can be done to promote the stigmatization to end rape as a tactic of warfare?
Describe two benefits of victory gardens beyond providing : Explain three reasons why war/victory gardens were important and Describe two benefits of victory gardens beyond providing food
Explain the event the boston tea party : Explain the event known as "The Boston Tea Party." What was it protesting, who was involved, what did they do, and what did the British government
What types of primary and secondary sources will you need : What types of primary and secondary sources will you need to use to support the topic you are examining in your essay?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd