Jason Reflection (1)

docx

School

Centennial College *

*We aren’t endorsed by this school

Course

101

Subject

Information Systems

Date

Apr 3, 2024

Type

docx

Pages

5

Uploaded by HighnessBraveryButterfly42

Report
Name: Jason Hunte Student ID: 127299220 RIS 430: Analyzing Vulnerabilities and Threats Assignment 2: Reflective Journal Instructor: Saeed Naghizadeh Qomi
Table Of Contents Introduction: Navigating the Cybersecurity Terrain ........................................................................ 3 Deployment Insights: WebGoat on Ubuntu VM ............................................................................. 3 Vulnerability Identification: ZAP and Nuclei Scanners in Synchrony ............................................ 3 Risk Assessment Deconstructed: Applying the TVRA Framework ................................................ 3 Vulnerability Management Insights: Heimdall2 Integration ........................................................... 4 Report Crafting Insights: Structuring a Vulnerability Assessment Template .................................. 4 Achievement Insights: Milestones in Cybersecurity Proficiency .................................................... 4 Challenge Insights: Integration Hurdles with Heimdall2 ................................................................ 4 Improvement Insights: Strategies for Enhanced Cybersecurity Proficiency ................................... 4 Conclusion: Reflecting on the Cybersecurity Expedition ............................................................... 4
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Introduction: Navigating the Cybersecurity Terrain This reflection's main purpose is to examine the complex realm of cybersecurity procedures, with a particular emphasis on the methodical process of locating, evaluating, and controlling web application vulnerabilities. The task covered a wide range of cybersecurity topics, from configuring a weak application for instructional reasons to delving deeply into the layers of risk assessment and security scanning techniques. The objective of this expedition was to construct a robust structure for handling the constantly changing cybersecurity risks and recording the results using a methodical and perceptive approach. Deployment Insights: WebGoat on Ubuntu VM This cybersecurity journey began with the installation of WebGoat, a purposefully insecure online application, on an Ubuntu virtual machine. This first action was an attempt to comprehend the intricate relationship between security postures and application dependencies. The painstaking procedure brought to light the critical requirement for precision and a detailed comprehension of the configuration of the program and its deliberate errors. Vulnerability Identification: ZAP and Nuclei Scanners in Synchrony A two-pronged strategy was used to identify vulnerabilities, utilizing the advantages of both ZAP and Nuclei scanners. This thorough screening approach revealed a wide range of possible security risks, from subtle vulnerabilities to missing security headers. It was like taking off layers of skin, with every scan disclosing more about the complex weaknesses present in the WebGoat program. Risk Assessment Deconstructed: Applying the TVRA Framework When vulnerabilities were discovered, the assignment changed to a thorough risk analysis utilizing the TVRA (Threat, Vulnerability, and Risk Assessment) framework. A deliberate and prioritized reaction to the most pressing dangers was made possible by the methodical approach that helped to reduce the plethora of issues that were identified into a quantifiable risk landscape. Vulnerability Management Insights: Heimdall2 Integration It was a difficult yet informative process to include the Heimdall2 vulnerability management tool into the project workflow. It required a thorough examination of the subtleties of efficient cybersecurity procedures and the intricacies of tool compatibility. This stage gave important insights into the real-world difficulties of using advanced cybersecurity solutions in a coordinated and effective way.
Report Crafting Insights: Structuring a Vulnerability Assessment Template The creation of a thorough vulnerability assessment report template marked the project's completion. This template was created by carefully examining expert reports and condensing difficult information into an understandable and enlightening manner. The purpose of the template was to provide stakeholders with a thorough means of understanding the complexities of cybersecurity findings. Achievement Insights: Milestones in Cybersecurity Proficiency This reflection details the accomplishments that have been made throughout the project, starting with the effective implementation of WebGoat and continuing with the skillful use of sophisticated security scanners and the application of a structured risk assessment framework. With each milestone, cybersecurity expertise grew and the complexity of the field was better understood. Challenge Insights: Integration Hurdles with Heimdall2 One of the more demanding aspects encountered during the project was the integration of WebGoat with the Heimdall2 tool. This challenge served as a catalyst for professional growth, signifying the importance of persistence and adaptive problem-solving in the face of technical obstacles. Improvement Insights: Strategies for Enhanced Cybersecurity Proficiency The process of the project has shown a number of areas that could use improvement, especially with regard to vulnerability scanning and management tool integration. Future improvement tactics include expanding the testing's purview, investing more time in learning how to use sophisticated tools, and looking for professional guidance and mentoring in the cybersecurity industry. Conclusion: Reflecting on the Cybersecurity Expedition As this reflective journal comes to an end, it not only summarizes the technical lessons learned and difficulties encountered, but it also emphasizes how ongoing learning is in the cybersecurity industry. The journey through WebGoat, ZAP, Nuclei, and Heimdall2 has shown how important it is to continue learning, to embrace community collaboration, and to adopt multidimensional methods to problem- solving in order to successfully navigate the ever-changing cybersecurity landscape.