Interpretations of the nessus report

Assignment Help Basic Computer Science
Reference no: EM131223349

Consider the following scenario: You are a new security administrator in the credit card division of a multinational bank. Your division deals with personally identifiable information of the bank's cardholders. To comply with regulations on personally identifiable information, you need to perform monthly network vulnerability scans. The previous security administrator ran frequent vulnerability scans, but had a hard time getting anyone to address the findings. You plan to develop a process for monthly scanning and remediation, including how to handle exceptions when the report shows a false positive or when the business needs more time to address an issue. You have a copy of the latest vulnerability report. Refer to the "Nessus Full Network Scan, Detailed Findings" web resource from the Learning Resources. The report lists server names, vulnerabilities, and the severity of these vulnerabilities. Each vulnerability has an associated Common Vulnerabilities and Exposures (CVE) number. Refer to the Common Vulnerabilities and Exposures website  which explains the vulnerabilities in depth.

For this Assignment, write a 4- to 6-page paper that summarizes your interpretations of the Nessus report and your recommendations to address the reported vulnerabilities. Cover the following points in your paper:

  • Follow the links for the vulnerabilities categorized as high and briefly explain what is involved in remediation of each.
  • Explain, based on your readings, why sometimes vulnerabilities need to be addressed by changes to the OS configuration (OS hardening) and why not every vulnerability can be quickly remediated with a patch or upgrade.
  • Outline a process for monthly vulnerability scanning, review, and remediation. Explain the significance of each step in this workflow.

Reference no: EM131223349

Questions Cloud

Estimates the allowance for uncollectible accounts : Chez Fred Bakery estimates the allowance for uncollectible accounts at 3% of the ending balance of accounts receivable. During 2013, Chez Fred's credit sales and collections were $125,000 and $131,000, respectively. What was the balance of accounts r..
Calculate the gross margin for may under absorption costing : Brush Industries reports the following information for May: Sales $950,000 Fixed cost of goods sold 110,000 Variable cost of goods sold 260,000 Fixed selling and administrative costs 110,000 Variable selling and administrative costs 135,000 Calculate..
Total storage capacity of disk : You have a hard drive with 16,384 cylinders, 16 heads, and 63 sectors per track. What is the total storage capacity of this disk?
The aggregate demand aggregate supply framework : Use the aggregate demand-aggregate supply framework to illustrate a situation where this would lead to lower inflation in this economy in the long run.
Interpretations of the nessus report : For this Assignment, write a 4- to 6-page paper that summarizes your interpretations of the Nessus report and your recommendations to address the reported vulnerabilities. Cover the following points in your paper:
What would be the incremental income and loss per tin : Yumminess has asked Jordon and Taylor to consider making Extra Attack Brownies and Nutty Attack Brownies, in addition to Chocolate Attack Brownies. The selling price to Yumminess would be $12 and $14.50 per tin, respectively, compared to the original..
Summary of a networked application : Write a one-page summary of a networked application of your choosing. Conciseness is more important than comprehensiveness, although you should strive for a balance between both. The definition of a networked application in this instance is relati..
Prepare stockholders equity section of the balance sheet : Squires Inc. was organized on January 2, 2014 with authorized capital stock consisting of 40,000 shares of 10%, $200 par value preferred, and 300,000 shares of no-par, no stated value common. Prepare the stockholders’ equity section of the balance sh..
Write about corporate blogging : As the primary Technical Writer, you have been asked to consider building a blog within the client's new website. Your boss has asked you to write about corporate blogging, make recommendations, and provide a rationale for each recommendation.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Common characteristics of high-quality information

Describe each of the five common characteristics of high-quality information (accuracy, completeness, consistency, uniqueness, and timeliness).

  Develop an online shopping website with html or css or php

Design a free online website using the following languages tools HTML, XHTML, CSS, Javascript, PHP and MySQL, etc. The website also must include login screen: the input boxes should display "Enter Your Username" in Username and "Enter Your Passwor..

  What-if analysis component

This module's project piece adds a What-If analysis component into your Excel project workbook. Using whatever tools and examples are at your disposal, incorporate at least one supported What-If analysis into your Excel project workbook

  Compute the amounts of raw materials needed to produce

Obtain a matrix algorithm to compute the amounts of raw materials needed to produce a given amount of each alloy. Use MATLAB to determine how much raw material of each type is needed to produce 1000 tons of each alloy.

  Does this cause a cycle in the authorization graph

Does this cause a cycle in the authorization graph

  Industrial applications of electrical engineering technology

1. What are some industrial applications of Electrical Engineering Technology? 2. Can Scratch program can be used as tool to prototype ideas in software applications? 3. Is SuperConductivity when we have temperatures near some very low temperatures?

  Activities of the employee benefit system

Alice has a high regard for privacy and wants the system to have employeesregister and give permission to obtain financial amounts from the dental insurance and retirementcompanies. Draw a use case diagram, context-level data flow diagram represen..

  Litigating divorce and insurance fraud cases

Should congress enact laws requiring ISP's to formally track their customers' activities in an attempt to aid police investigating crimes, attorneys litigating divorce and insurance fraud cases, and the entertainment industry in locating illegally..

  Multidimensional databases different from relational

1. How are a data warehouse and a data mart related? 2. Why must data be "transformed" by the ETL process before loading them in the data warehouse? 3. How are multidimensional databases different from relational databases?

  How many code words have exactly three 0''s

How many code words have exactly three 0's?

  Features in modern automobile are customer driven

A. What features in modern automobile are customer driven? B. Henry Ford once said something to the effect that the customer can have any color Model T he wants as long as its black. How did the world evolve from (HF) his attitude towards customer ..

  Explaining smartphones as important digital devices

Many resources will suggest that in the next few coming years, smartphones will become the one of the most important digital devices we own. Explain the implications of this statement.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd