Preview

risk memo

Satisfactory Essays
Open Document
Open Document
774 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
risk memo
Subject: VULNERABILITY ASSESSMENT

I am writing this memo to inform you that it is my professional opinion that the network in need of a full vulnerability assessment. There are three tools that I believe would be a good fit for penetration testing on this network. They are NMAP, Nessus and Metasploit. I have added brief, yet detailed, descriptions of the three automated penetration testing tools that are on the market. I believe they all have their pros and cons and I will explain the capabilities and costs associated with all three in this memo.
NMAP
NMAP is used to scan for open ports, identify services, and identify the operating system that the machine utilizes. This allows data that is extracted to be used to perform more direct vulnerability assessments. NMAP is not known to be a vulnerability scanner as other tool in the industry are. It is a stealthier tool than most. Meaning, it is a much quicker and more quiet than other tools. NMAP utilizes the Three Way : syn  syn/ack ack. The handshake helps with fire walking. Fire Walking is how a scanner determines the movement of a packet from an untrusted external host to a trusted host. This helps to determine which ports are open and what type of packets can travel to the internal host. This program helps with what and how many computers are on a network. It allows you to determine what services are running on a given machine. It allows you to find corresponding exploits for all systems. What is most attractive about NMAP is its price – FREE. The only associated cost with this automated tool is the training needed to run it effectively.
Pros:
NMAP is continuously update.
It was written by a security professional.
It is a solid port scanner with numerous capabilities beyond what may be needed.
Discovers IP addresses
Stealthy
OS and application version detection
Command line availability
Cons:
The scans are very aggressive and not

You May Also Find These Documents Helpful

  • Good Essays

    Team B has been commissioned to examine the Kudler Fine Foods’ (KFF), frequent shopper, Customer Loyalty Program that is currently in development. The team has also been asked to direct the system development team to ensure the system is established securely so that it properly protects company data and customer information throughout all stages of the system development process. In week 2, the team will examine the Customer Loyalty Program for vulnerabilities in different areas of the system. The study will define the possible threats that exist to the security of the organization’s and the customers’ data and information, the potential vulnerabilities each threat may exploit, and area of the system affected by the threats. Additionally, a summary of the most critical threats to Kudler’s Customer Loyalty Program will be provided.…

    • 745 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Port scanner is the software program created and designed to probe a server or host for open ports. This is often run and used by administrators to acknowledge security policies of their networks and for attackers to identify running services on a host with the view to compromise it.…

    • 281 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Vulnerability Mapping and Penetration – Any computers or devices that are found will be scanned for vulnerabilities using a wide variety of tools and techniques. The tools and techniques used will be consistent with current industry trends regarding exploitation of vulnerabilities. Malcolm Testing Solutions will attempt to find the a weak link within the network that can be exploited to penetrate the network up to…

    • 468 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab #2

    • 402 Words
    • 2 Pages

    This lab demonstrated the first three steps in the hacking process that is typically performed when conducting ethical hacking or penetration testing. The first step in the hacking process is to perform an IP host discovery and port/services scan (Step 1: Reconnaissance and Probing) on a targeted IP subnetwork using Zenmap GUI (Nmap) security scanning software. The second step in the hacking process is to perform a vulnerability assessment scan (Step 2: Scanning) on the targeted IP subnetwork using Nessus vulnerability assessment scanning software. Finally, the third step in the hacking process (Step 3: Enumeration) is to identify information pertinent to the vulnerabilities found to exploit the vulnerability.…

    • 402 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Nmap now in version 4.0 is an open source scanner. It test can test your firewall and network applications whether hidden or not. Nmap also tests the intrusion detection system (IDS). Nmap is fairly easy to use and a simple scan just scratches the surface of the capabilities the program can do for you in a network vulnerability scan. There is also a website dedicated to the commands you can enter into nmap and usage scenarios that you may encounter. At the very core, nmap uses a system of 11 scan techniques, all with different customizations (Fellinge 2006). The newer version of nmap allows users now to run the make certain changes to the program without having to restart the application, this new feature sets a milestone in the online hacking…

    • 838 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    Memo

    • 302 Words
    • 2 Pages

    In conclusion there were fifty one abnormalities found and spoken of for the 2007 Revenue Cycle. Out of the fifty one transactions thirty one of them were found without credit approval. A total of 11.5 percent in the total sales had been in delinquent states for thirty days before it was actually collected. Then you also have the accounts receivable state on nine days past due with an amount over fourteen thousand dollars. In order for the receivables cycle to show improvement the sales order credit approval and the compliance process needs to show a more detailed process improvement.…

    • 302 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    analysis are either built into the operating system, or are available at no cost. Two such tools for…

    • 3838 Words
    • 17 Pages
    Good Essays
  • Powerful Essays

    Manage Risk

    • 7591 Words
    • 24 Pages

    The reason the investigation was conducted was to gauge what was both good and bad about the new café opening, what needs to be changed in order to increase efficiency at work and any legislative laws involved.…

    • 7591 Words
    • 24 Pages
    Powerful Essays
  • Good Essays

    Week 5 you decide

    • 928 Words
    • 4 Pages

    Vulnerability scanners can help determine patching policy. Once we know what vulnerabilities are exposed, we can make decisions about what can and cannot be tolerated in the network environment. Knowing our typical network behavior can highlight common activity that we might want to stop via policy or other tools. Both of these technologies provide visibility into network traffic. Network risk mapping can find vulnerable data and network device configurations and help us prioritize which issues to resolve first. Data can be based on defined nodes, directly vulnerable hosts, non-secured configuration of network equipment, and the end users most susceptible compromises.…

    • 928 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Memo

    • 647 Words
    • 3 Pages

    Have you ever left a container with some type of liquid in it and wondered how it could it evaporate so quickly? The evaporation of an unpredictable liquid is an endothermic process that results in a temperature decrease. The amount of temperature decrease is related to the strength of intermolecular forces of attraction. The rate of evaporation can be described as the change of temperature divided by the time it takes to reach the lowest temperature. ΔT/Δt (°C/s). In this experiment my group and I are investigating factors that determine the strength of intermolecular forces by determining the rate at which liquids evaporate. The different types of intermolecular forces are as follows, Ion dipole are the strongest forces, Dipole Dipole which are between polar molecules and both positive and negative ions attract to each other, dispersion are the weakest of all intermolecular forces, they also are formed by the shifting of electron clouds within molecules and hydrogen bonding which is attractive force between the hydrogen attached to an electronegative atom of one molecule and an electronegative atom…

    • 647 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Risk Management

    • 786 Words
    • 4 Pages

    Pizza rush is a large take-away company in Australia with a total of to take-away stores scattered in all major cities nationwide…

    • 786 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Paper

    • 292 Words
    • 2 Pages

    10. Based on your Nmap scan results and initial reconnaissance & probing, what next steps would you perform on the VM server farm and VM workstation targets?…

    • 292 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Memo

    • 408 Words
    • 2 Pages

    1. Lou Zar's action regarding to sewing a replica of the U.S. flag to cover the backside/seat of his uniform pants was not unconstitutional. There needs to be compelling reason to restrict Lou from wearing that uniform that caused negative emotion. It would be unconstitutional if the government restricted Zar from wearing his uniform without a compelling reason. The government cannot prove that Zar's intentions were to commit or threaten any act of violence through his speech. It is true that Zar's action caused other people to get angry at the message he was trying to send and caused violence against him. But, Zar had every right to express his message by wearing his uniform. Also, there was no evidence the people are provoked by the uniform…

    • 408 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Memos

    • 335 Words
    • 2 Pages

    This is a review of directive & informative memos that you learned about in Module 3.…

    • 335 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Policy Memo

    • 2487 Words
    • 10 Pages

    The Government of Pakistan identified 4 medical Colleges for introduction of COME, one from each province. Curriculum was prepared by the faculty of these colleges and launched in 2001 and despite concerted efforts could not be implemented. The purpose of this research was to identify the reasons for delay in implementation of the COME curriculum and to assess the understanding of the stakeholders about COME.…

    • 2487 Words
    • 10 Pages
    Powerful Essays