unit 4 assignment

docx

School

Columbia Southern University *

*We aren’t endorsed by this school

Course

3301

Subject

Information Systems

Date

Dec 6, 2023

Type

docx

Pages

5

Uploaded by briandjones127

Report
Running head: UNIT IV ASSIGNMENT 1 Unit IV Assignment Security Application Development Brian Jones Columbia Southern University
UNIT IV ASSIGNMENT 2 Screenshot of Hosts tab Screenshot of Vulnerabilities tab
UNIT IV ASSIGNMENT 3 Screenshot of History tab These are the screenshots of the three tabs taken of my system with the Nessus vulnerability scanner. As you can see, there is nothing to show. This is due to my old computer having a catastrophic hard drive failure, and this scan was the first task I performed on my brand- new laptop. Professor Pierce, if you recall my email stating that I had issues getting the appropriate applications to download, the result was my old computer dying a slow, painful death. I will endeavor to write this report as best I can using information I have gathered from the Nessus website and the class textbook mixed with a fair bit of “what if” scenarios and guesswork. In my estimation, no vulnerabilities should pass through your computer, no matter how minor it is perceived to be. Of course, the vulnerabilities that are deemed to be of a higher severity should be addressed which much more urgency than those of a lower threat level[ CITATION Cam16 \l 1033 ]. I am also of the thinking that the lower level threats should
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
UNIT IV ASSIGNMENT 4 never be pushed to the back burner, so to speak. It is only a matter of time before hackers and exploiters learn to use those lower level vulnerabilities that most people consider to be a non- urgent threat to gain access to systems, if they have not done so already. Another big factor to consider when it comes to vulnerability assessment is cloud based information. With more and more users, both individual and corporate, using cloud-based storage the chances of their information being compromised is growing every day. This is a concept featured prominently on the Nessus site, they call it Cyber Exposure[ CITATION Ten19 \l 1033 ]. It means the amount of your information and data that can be seen by others, lawfully or otherwise. Nessus offers a system that gives real time visibility into cloud environments that gives an IT manager or security specialist an edge by giving a full picture of the cloud infrastructure. If an organization or company were to employ a “full spectrum” scan program in conjunction with an IDPS (intrusion detection and prevention system)[ CITATION Whi17 \l 1033 ], they should have a good handle on their security. For an individual, I feel that having a good anti-virus, firewall, and possibly a scanning tool such a Nessus should give the average person better than average protection and monitoring against threats and attacks. References
UNIT IV ASSIGNMENT 5 Camejo, C. (2016, November 22). Why low severity vulnerabilities can still be high risk. Retrieved from https://www.securitymagazine.com/articles/87600-why-low-severity- vulnerabilities-can-still-be-high-risk Tenable, Inc. (2019). Solutions for cloud security. Retrieved from https://www.tenable.com/solutions/cloud-security Whitman, M.E. & Mattord, H.J. (2017). Principals of information security. Boston, MA: Cengage Learning