CYB101 WK 3 D1 Reply 23

docx

School

Arizona State University *

*We aren’t endorsed by this school

Course

CYB101

Subject

Information Systems

Date

Dec 6, 2023

Type

docx

Pages

1

Uploaded by Gwagonupstate

Report
I agree with you that when there is a well-kept inventory in the organization, it helps to accurately maintain their asset inventory. This information is the lifeline of most organizations, so to make sure that the infrastructure is constantly maintained is an obvious choice. No system is perfect, and hackers spends their lives looking for these entry points so security teams must be equally as vigilant in monitoring through the use of vulnerability scans. Your post is clear and straightforward to follow, fully describing the steps necessary to implement a vulnerability scan including the mention of the tools used to identify vulnerabilities within networks. Thank you for your explanation of the specific uses of additional vulnerability scanners other than Nessus in your reply to my post in which I did not cover these specific tools. Great work on the post and look forward to reading your future posts. A vulnerability is the described as identifying weaknesses and flaws in security by using software to find them. Vulnerability scanners are able to continuously monitoring systems. A vulnerability scan can reduce the attack surface. It can identify risk by scanning the network or system. (Ciampa, 2021) Before a vulnerability scan can begin a baseline needs to be established of the data. The company then can complete both internal and external scans to check for anomalies. There are usually for step to a vulnerability scans. The scan first ping the network and check the data packets for bot TCP and UDP packets. Next the scan needs to check the open ports and the protocols running on the ports. The scan needs to gather the information from the system remotely if available. Lastly compare the information from the system for know vulnerabilities. Vulnerability tools are Nessus which is one of the most popular scanners. OpenVas is an open source scanner that includes many features to authenticate and unauthenticated tests. Kali Linux has Burp Suite that has PortSwigger than can focus on websites and web applications. Once a scan is completed it can provide several reports depending on the audience. A detailed report would be for cybersecurity professionals and management. Non detailed reports for other members of the organization.
Discover more documents: Sign up today!
Unlock a world of knowledge! Explore tailored content for a richer learning experience. Here's what you'll get:
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help