unit 4 assignment
docx
keyboard_arrow_up
School
Columbia Southern University *
*We aren’t endorsed by this school
Course
3301
Subject
Information Systems
Date
Dec 6, 2023
Type
docx
Pages
5
Uploaded by briandjones127
Running head: UNIT IV ASSIGNMENT
1
Unit IV Assignment
Security Application Development
Brian Jones
Columbia Southern University
UNIT IV ASSIGNMENT
2
Screenshot of Hosts tab
Screenshot of Vulnerabilities tab
UNIT IV ASSIGNMENT
3
Screenshot of History tab
These are the screenshots of the three tabs taken of my system with the Nessus
vulnerability scanner. As you can see, there is nothing to show. This is due to my old computer
having a catastrophic hard drive failure, and this scan was the first task I performed on my brand-
new laptop. Professor Pierce, if you recall my email stating that I had issues getting the
appropriate applications to download, the result was my old computer dying a slow, painful
death. I will endeavor to write this report as best I can using information I have gathered from
the Nessus website and the class textbook mixed with a fair bit of “what if” scenarios and
guesswork.
In my estimation, no vulnerabilities should pass through your computer, no matter how
minor it is perceived to be. Of course, the vulnerabilities that are deemed to be of a higher
severity should be addressed which much more urgency than those of a lower threat
level[ CITATION Cam16 \l 1033 ]. I am also of the thinking that the lower level threats should
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
UNIT IV ASSIGNMENT
4
never be pushed to the back burner, so to speak. It is only a matter of time before hackers and
exploiters learn to use those lower level vulnerabilities that most people consider to be a non-
urgent threat to gain access to systems, if they have not done so already.
Another big factor to consider when it comes to vulnerability assessment is cloud based
information. With more and more users, both individual and corporate, using cloud-based storage
the chances of their information being compromised is growing every day. This is a concept
featured prominently on the Nessus site, they call it Cyber Exposure[ CITATION Ten19 \l
1033 ]. It means the amount of your information and data that can be seen by others, lawfully or
otherwise. Nessus offers a system that gives real time visibility into cloud environments that
gives an IT manager or security specialist an edge by giving a full picture of the cloud
infrastructure.
If an organization or company were to employ a “full spectrum” scan program in
conjunction with an IDPS (intrusion detection and prevention system)[ CITATION Whi17 \l
1033 ], they should have a good handle on their security. For an individual, I feel that having a
good anti-virus, firewall, and possibly a scanning tool such a Nessus should give the average
person better than average protection and monitoring against threats and attacks.
References
UNIT IV ASSIGNMENT
5
Camejo, C. (2016, November 22). Why low severity vulnerabilities can still be high risk.
Retrieved from
https://www.securitymagazine.com/articles/87600-why-low-severity-
vulnerabilities-can-still-be-high-risk
Tenable, Inc. (2019). Solutions for cloud security. Retrieved from
https://www.tenable.com/solutions/cloud-security
Whitman, M.E. & Mattord, H.J. (2017). Principals of information security. Boston, MA:
Cengage Learning