CYB101 WK 3 D1 Reply 23
docx
keyboard_arrow_up
School
Arizona State University *
*We aren’t endorsed by this school
Course
CYB101
Subject
Information Systems
Date
Dec 6, 2023
Type
docx
Pages
1
Uploaded by Gwagonupstate
I agree with you that when there is a well-kept inventory in the organization, it helps to accurately
maintain their asset inventory. This information is the lifeline of most organizations, so to make sure that
the infrastructure is constantly maintained is an obvious choice. No system is perfect, and hackers
spends their lives looking for these entry points so security teams must be equally as vigilant in
monitoring through the use of vulnerability scans.
Your post is clear and straightforward to follow, fully describing the steps necessary to implement a
vulnerability scan including the mention of the tools used to identify vulnerabilities within networks.
Thank you for your explanation of the specific uses of additional vulnerability scanners other than
Nessus in your reply to my post in which I did not cover these specific tools. Great work on the post and
look forward to reading your future posts.
A vulnerability is the described as identifying weaknesses and flaws in security by using software to find
them. Vulnerability scanners are able to continuously monitoring systems. A vulnerability scan can
reduce the attack surface. It can identify risk by scanning the network or system. (Ciampa, 2021) Before a
vulnerability scan can begin a baseline needs to be established of the data. The company then can
complete both internal and external scans to check for anomalies. There are usually for step to a
vulnerability scans. The scan first ping the network and check the data packets for bot TCP and UDP
packets. Next the scan needs to check the open ports and the protocols running on the ports. The scan
needs to gather the information from the system remotely if available. Lastly compare the information
from the system for know vulnerabilities. Vulnerability tools are Nessus which is one of the most popular
scanners. OpenVas is an open source scanner that includes many features to authenticate and
unauthenticated tests. Kali Linux has Burp Suite that has PortSwigger than can focus on websites and
web applications. Once a scan is completed it can provide several reports depending on the audience. A
detailed report would be for cybersecurity professionals and management. Non detailed reports for
other members of the organization.
Discover more documents: Sign up today!
Unlock a world of knowledge! Explore tailored content for a richer learning experience. Here's what you'll get:
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help