Preview

Unit 4 Assignment 1: Identify Unnecessary Services from a Saved Vulnerability

Satisfactory Essays
Open Document
Open Document
329 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Unit 4 Assignment 1: Identify Unnecessary Services from a Saved Vulnerability
Unit 4 Assignment 1: Identify Unnecessary Services from a Saved Vulnerability Nmap/Zenman is an application that allows users to scan networks to see what ports and services are open. It can be used by network security to find holes in their networks and plan what to do with them or it can be used by hackers to scan other networks to get a clear look at a networks topology and map out where everything is and plan for an attack. In this case, we have a scan of our network at Corporation Techs and need to look at what services that we have and make a decision on whether or not we should keep or get rid of them. According to the scan we have, we have a bunch of difference services that we use. Simple Mail Transfer Protocol (SMTP) is how our employees sent their mail. Post Office Protocol (POP) is the services on how we receive them. These are both important in any business so they could send and receive messages so I would not recommend closing them. As I look through more services that we have on our network, I notice that we have Sophos installed on our app server. Sophos is a company that works in anti-virus software. They been in business for a few years and to my knowledge they do a good job. However in this case we have enough anti-virus software and our network is very stable. Matter of fact, the scan also shows that we have other IDS and other services that will protect this network. I believe that Sophos is a good service but it is unnecessary at this time so I would suggest removing this. My plan for removing unnecessary services is simple. Go though our network to see we have and have not been using and make a list of services that are necessary to keep this network working. Any services that do not make the cut, gets cut.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    NT1110 Module5 Lab

    • 254 Words
    • 2 Pages

    1. A user boots his or her computer and hears a sequence of six beeps. The computer uses AMI BIOS. What error is indicated by the six beeps?…

    • 254 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Nt1330 Unit 4 Paper

    • 567 Words
    • 3 Pages

    Emails provide stability to the organizations. Emails are the backbone that forms the base for the organization structure. Organization has different department for a different purpose. In order to communicate with the environment. Organizations use MS Outlook for maintaining a healthy communication environment in different departments. Every user mailbox data is stored in on exchange server in the form of edb files. In the presence of certain conditions EDB files of MS Outlook get corrupt and are not accessible.…

    • 567 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    1. Port Scanning is the usage of software to find what ports are open on a network or on an individual computer, and which services are using those ports.…

    • 216 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    The IT developers will ask questions in an individual interview process to get the personal touch for those using the new HR application. The developers will also put on group meetings throughout the phases of the Software Development Life Cycle (SDLC). This process will let the HR department know what is plausible and what will not work. Those adjustments are necessary get the right application for the HR department to work fast and efficient.…

    • 1207 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Riordan Manufacturing is interested in integrating its existing variety of HR tools into a single integrated application. The service request is tasked to define the business requirements for the development of an HR system to support the objective. The requirements of this project will include the description of the application architecture, process design, and security controls recommended for the design of the HR system.…

    • 521 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Kavanagh, M.J., Thite, M. (nd). Human Resource Information System: Basics, Applications and Future Directions. Retrieved January 10, 2013, from http://books.google.com/books?id=b87i7eoSPHkC&pg=PA16&dq=hris+system…

    • 1119 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    Nmap "Network Mapper" is a free and open source utility for network discovery and security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw IP packets to determine what hosts are available on the network, what services those hosts are offering, what operating systems they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics.…

    • 281 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Nmap ("Network Mapper") is a free and open source utility for network discovery and security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw IP packets to determine what hosts are available on the network, what services those hosts are offering, what operating systems they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. It was designed to rapidly scan large networks, and also works against single hosts. Nmap runs on all major computer operating systems, Linux, Windows, and Mac OS…

    • 414 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab #2

    • 402 Words
    • 2 Pages

    3. Which application is used for Step 2 in the hacking process to perform a vulnerability assessment scan?…

    • 402 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    unit 210

    • 516 Words
    • 3 Pages

    1.1 /2 Some mail may contain confidential or private information. This may include personal details or information about the businesses employees or contain business confidentiality information such as names and addresses of customers or information that is relative to the business, customers, and clients. Also, mails and packages have to be checked for suspicious features. Security procedures have to also be followed when dealing with mails and packages.…

    • 516 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    NT2580 Graded Assignments

    • 5288 Words
    • 22 Pages

    I have correctly matched all the risks or threats within the seven domains of a typical IT infrastructure with the solutions and preventative actions.…

    • 5288 Words
    • 22 Pages
    Better Essays
  • Satisfactory Essays

    Testing and monitoring security controls can come in different factors. Monitoring security is by far important because you need to know what’s going on before you can announce it. Networking abuse is by far the biggest baseline anomaly. For employees who have access to the internet, the network can be used to stream media, to access social websites and to download unauthorized software or free software which has vulnerabilities a long with that.…

    • 564 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The basic strategies of attack surface reduction are to reduce the amount of code running, reduce entry points available to untrusted users, and eliminate services requested by relatively few users. One approach to…

    • 348 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Hackers typically follow a five-step approach to seek out and destroy targeted hosts. The first step in performing an attack is to plan the attack by identifying the target and learning as much as possible about it. Hackers usually perform an initial reconnaissance and probing scan to identify IP hosts, open ports, and services enabled on servers and workstations. In this lab, you planned an attack on 172.30.0.0/24 where the VM server farm resides, and used the Zenmap GUI to perform an “Intense Scan” on the targeted IP subnetwork.…

    • 1091 Words
    • 5 Pages
    Good Essays
  • Best Essays

    Content 1.0 Executive Summary 2.0 Introduction 3.0 The service package 4.0 Service people and the service encounter 5.0 Service Processes 6.0 Capacity management 7.0 Conclusion 8.0 Visitations 9.0 References and bibliography 10.0 Appendices…

    • 3532 Words
    • 15 Pages
    Best Essays