Preview

Is 305 Week 3 Lab

Good Essays
Open Document
Open Document
806 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Is 305 Week 3 Lab
-------------------------------------------------
Week 3 Laboratory

How to Identify Threats & Vulnerabilities in an IT Infrastructure Using ZeNmap GUI (Nmap) & Nessus Reports

Learning Objectives and Outcomes
Upon completing this lab, students will be able to: 1. Understand how risk from threats and software vulnerabilities impacts the seven domains of a typical IT infrastructure
2 Review a ZeNmap GUI (Nmap) network discovery and Nessus vulnerability assessment scan report (hardcopy or softcopy)
3. Identify hosts, operating systems, services, applications, and open ports on devices from the ZeNmap GUI (Nmap) scan report
4. Identify critical, major, and minor software vulnerabilities from the Nessus vulnerability assessment scan report
5. Prioritize the identified critical, major, and minor software vulnerabilities
6. Verify the exploit potential of the identified software vulnerabilities by conducting a high-level risk impact by visiting the Common Vulnerabilities & Exposures (CVE) online listing of software vulnerabilities at http://cve.mitre.org/

Week 3 Lab: Assessment Worksheet

Identify Threats and Vulnerabilities in an IT Infrastructure

Overview

One of the most important first steps to risk management and implementing a security strategy is to identify all resources and hosts within the IT infrastructure. Once you identify the workstations and servers, you now must then find the threats and vulnerabilities found on these workstations and servers. Servers that support mission critical applications require security operations and management procedures to ensure C-I-A throughout. Servers that house customer privacy data or intellectual property require additional security controls to ensure the C-I-A of that data. This lab requires the students to identify threats and vulnerabilities found within the Workstation, LAN, and Systems/Applications Domains.

Lab Assessment

You May Also Find These Documents Helpful

  • Satisfactory Essays

    IS3110: Unit 1 Role Scenario 1) Identify threats to the seven domains of IT within the organization: A. User: Destroy data B. Workstation: Loss of data, not updated C. LAN: Unauthorized user, weak password D. LAN –WAN: Hackers, weak traffic filtering E. WAN- FTP anon uploads, DoS/DDoS F. System Application: Fire, DoS/DDoS, SQL injection corrupting data G. Remote: user virus, remote from office unsecure, VPN tunnel hack 2) Identify vulnerabilities in the seven domains of IT within the organization. A. User: Infected media, social engineering B. Workstation: OS vulnerability, browser vulnerability C. LAN: Worms, LAN OS vulnerability D. LAN-WAN: malicious websites, unblocked ports E. WAN: network outages F. System Application: ISP…

    • 259 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    ISSC362 Week 2

    • 645 Words
    • 3 Pages

    During the reconnaissance step of the attack, describe what task Zenmap GUI performs to do passive OS fingerprinting.…

    • 645 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    a. Nessus is an application built for network discovery of devices and the operating systems and software running on them. This is a policy definition of it. IT is a free program that can be downloaded but donations are accepted. IT is also an open source program so people are constantly improving it.…

    • 486 Words
    • 3 Pages
    Satisfactory Essays
  • Best Essays

    Aircraft Solutions Project

    • 2440 Words
    • 10 Pages

    The purpose of the report is to assist Aircraft Solutions (AS) in indentifying the most significant Information Technology (IT) security vulnerabilities. AS products and services are at the forefront of the industry and the protection of such is very important as they are an industry leader. The vulnerabilities that will be discussed are the firewall configuration, virtualization of their hardware assets and defining security policy regarding the timeliness of firewall configuration and updates.…

    • 2440 Words
    • 10 Pages
    Best Essays
  • Good Essays

    RLOT2 Task 2 B rev 1

    • 569 Words
    • 2 Pages

    Defense in Depth provides the university several layers of protection. Starting at the endpoints, host intrusion protection (HIPS), should be installed on each Device. Properly installed, HIPS will not permit the installation of unauthorized programs. This was the root cause of the (D)DoS recently experienced. At the routers access control lists (ACLs) must be put in place to allow only traffic with a legitimate protocol and destination. Between the routers and the endpoint a firewall solution must be put in place. The firewall must be configured to allow only allowed protocols and port numbers to communicate with specific destinations. Between the firewall and endpoint a (D)DoS a detection tool (such as Arbor’s Prevail) must be put in place. This measure not only allows for quick detection of (D)DoS it also permits the automatic mitigation of the…

    • 569 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    A Network Management system, or NMS is a collection of software to be used as tools to monitor a network of computers. This software performs multiples tasked specifically designed to help keep a network managed properly and running smoothly. There are many components that can make up a Network management system. With all the options out there a network administrator is able to customize what features to utilize depending on their specific needs. This allows for real-time monitoring as well as report generated analyses. However, there are a few cornerstone components that should be explored. The Manager, Agent, MIB, Probe, SNMP, and RMON are probably the most valued components.…

    • 771 Words
    • 3 Pages
    Powerful Essays
  • Satisfactory Essays

    In this assignment we are asked to identify the major threats and security concepts from a whitepaper located on the internet: http://eval.symantec.com/mktginfo/enterprise/white_papers/b-whitepaper_internet_security_threat_report_xv_04-2010.en-us.pdf. This report stated that: “There are a number of recent and growing trends in the threat activity landscape that were observed by Symantec in 2009.” These threats are identified as:…

    • 275 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Identify risks that could lead to an information security breach, Identify vulnerabilities in system security, software operation, network design or employee procedures that could lead to a network failure.…

    • 339 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    FunSec2 SLM Lab04 Final

    • 295 Words
    • 2 Pages

    Analyzer (MBSA) to assess its security state, and you examined the results of the Microsoft…

    • 295 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Zenmap is a graphical interface for Nmap, a port scanning tool that can quickly identify hosts…

    • 652 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    Introduction to Information Security © ITT Educational Services, Inc. All rights reserved. Page 2 Key Concepts  Attacks, threats, and vulnerabilities in a typical IT infrastructure …

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    Is 305 Week 3 Quiz

    • 577 Words
    • 3 Pages

    Using the workstation domain, define risks associated within that domain and explain what can be done to reduce risks in that domain.…

    • 577 Words
    • 3 Pages
    Good Essays
  • Better Essays

    NT2580 Graded Assignments

    • 5288 Words
    • 22 Pages

    I have correctly matched all the risks or threats within the seven domains of a typical IT infrastructure with the solutions and preventative actions.…

    • 5288 Words
    • 22 Pages
    Better Essays
  • Satisfactory Essays

    homework 1

    • 454 Words
    • 2 Pages

    This is a matching activity. You will receive the Match Risks/Threats to Solutions worksheet, which contains a numbered list of common risks and threats found in a typical IT infrastructure. You must enter the letter for the correct solution or preventative action in the blank to the right of each risk or threat.…

    • 454 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Hacking Tools

    • 351 Words
    • 2 Pages

    There are always threats within the computer world, and hackers have tools that they use to hack into your computer and get data and information from within your system. They use tools like pass crackers, packet sniffers, vulnerability scanners, etc. to get this information. Zen map is one of the tools known as a network mapper security scanner GUI that uses raw IP packets to determine what hosts are available on the network, the services that they are running, the OS of their system and host names.…

    • 351 Words
    • 2 Pages
    Satisfactory Essays