Preview

IS3110 U5L1

Powerful Essays
Open Document
Open Document
912 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
IS3110 U5L1
IS3110 Lab5 Student Name: Tom Fletcher
Submission Requirements
Your last name must be in the filename of your submitted document according the assignment naming standard. IS3110_U5L1_Firstname_Lastname
Email to: SMichnick@itt-tech.edu
Due By: 6:00 PM CDT, Wednesday July 23, 2014
Note: Emails received after Due Date Due Date will be marked LATE and subject to a grade of 0 for the assignment.
Please refer to Pages 33-38 of the IS3110 Student Lab Manual when working on this lab.
Lab #5 – Assessment Worksheet
How to Identify Risks, Threats & Vulnerabilities in an IT Infrastructure Using
ZeNmap GUI (Nmap) & Nessus® Reports

Overview

One of the most important first steps to risk management and implementing a security strategy is to identify all resources and hosts within the IT infrastructure. Once you identify the workstations and servers, you now must then find the threats and vulnerabilities found on these workstations and servers. Servers that support mission critical applications require security operations and management procedures to ensure C-I-A throughout. Servers that house customer privacy data or intellectual property require additional security controls to ensure the C-I-A of that data. This lab requires the students to identify threats and vulnerabilities found within the Workstation, LAN, and Systems/Applications Domains.

1. What are the differences between ZeNmap GUI (Nmap) and Nessus?
ZeNmap is used to map a network and Nessus is used to Test a network for vulnerabilities.

2. Which scanning application is better for performing a network discovery reconnaissance probing of an IP network infrastructure? Nmaps sole purpose is just that, network probing and recon.

3. Which scanning application is better for performing a software vulnerability assessment with suggested remediation steps? Nessus would be a better tool for this operation. While you can find network vulnerabilities with Nmap, it is not used as such.

4. How many total scripts

You May Also Find These Documents Helpful

  • Good Essays

    you would use this type of application. Zenmap is a graphical interface for Nmap, a port scanning tool that can quickly identify hosts…

    • 652 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    IS3120 Unit 3

    • 650 Words
    • 2 Pages

    IS3120: Convergence of IP Based Network The dial up connection is made from a computer through modem and telephone line…

    • 650 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    4. What port scanning software would you recommend to your Senior Administrator? Explain why. Nmap ("Network Mapper") is a free and open source utility for network discovery and security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw IP packets to determine what hosts are available on the network, what services those hosts are offering, what operating systems they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. It was designed to rapidly scan large networks, and also works against single hosts. Nmap runs on all major computer operating systems, Linux, Windows, and Mac OS…

    • 414 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Is3110 Unit 4

    • 406 Words
    • 2 Pages

    If the project is completed on time then there is no risk for completion. All of the regular risks that apply to a project built on time apply to this one regardless of whether you are building a new infrastructure or modifying an older one. If the project is finished one month early, the quantitative risk really does not exist. It is basically comparable to completing the project on time. Since the project is quoted at 3 million dollars it will stay the same regardless of how fast the project is finished. However, you may see differences. When you rush a project this large you could possibly cut corners or receive poor quality results. If the project is finished two months late there are additional risks. If the company expects to make $20 million dollars annually, and assuming that the 4% penalty is levied against this yearly figure and not within smaller period of time, one month late means that US Industries Incorporated loses $800,000 annually. There doesn't appear to be any additional risk, however, further penalties and the possible eventual loss of the contract to a competitor could result in a poor product. There again appears to be no real quantitative risk involved if the project is finished a month early with the security requirements. If the originally quoted $3 million dollars remains the same regardless of how fast the project is finished and not coupled with hourly or daily wages, then there is nothing to lose financially. However the companies go beyond the required 1.5% completion benchmarks that the contract demands. Rushing a project of this scale also comes with rushed results possibly cut corners or poor quality. The credibility of the company is at stake with such a high profile, high income project such as this, and it is important to use all of the time available to ensure the best product is on display for any customer. The finished project should meet both the time and security requirements but not the service agreement. There does not…

    • 406 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Lab 1

    • 251 Words
    • 2 Pages

    Wireshark to capture and analyze network traffic and OpenVAS to scan the network. You reviewed a sample collection of data using NetWitness Investigator, connected to a remote…

    • 251 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2580 Lab 2

    • 385 Words
    • 2 Pages

    You can tell the scan to only include windows vulnerabilities. 8. Once vulnerability is identified by Nessus, where can you check for more information regarding the identified vulnerability, exploits, and the risk mitigation solution?…

    • 385 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    is3110 lab 1

    • 626 Words
    • 3 Pages

    2. How many threats and vulnerabilities did you find that impacted risk within each of the seven domains of a typical IT…

    • 626 Words
    • 3 Pages
    Good Essays
  • Good Essays

    operating system

    • 464 Words
    • 2 Pages

    7. Once a vulnerability is identified by Nessus, where can you check for more information regarding the identified vulnerability, exploits, and the risk mitigation solution?…

    • 464 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    The first lab task is to align your identified threats and vulnerabilities from Lab #1 – How to Identify Threats and Vulnerabilities in Your IT Infrastructure.…

    • 1165 Words
    • 6 Pages
    Satisfactory Essays
  • Satisfactory Essays

    3. Identify and document at least three vulnerabilities and the solutions related to the client configurations.…

    • 286 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    is3110 lab 5

    • 1037 Words
    • 5 Pages

    3. Which scanning application is better for performing a software vulnerability assessment with suggested remediation steps? The annual SANS Top 20 classifies most of these dangerous holes for both Windows and Unix, and prescribes best practices for patching and remediation. Also, the SANS Top 20 arranges vulnerabilities into 10 classes for each platform with categories of vulnerabilities within them.…

    • 1037 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    ISSC362 Lab 4 Assessment

    • 412 Words
    • 2 Pages

    3—Gaining Access 4—Maintaining Access 5—Covering Tracks 2. During the reconnaissance step of the attack, describe what task Zenmap GUI performs to do passive OS fingerprinting.…

    • 412 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Penetration Test plan

    • 869 Words
    • 4 Pages

    5. Goals & objectives: To find as many known vulnerabilities that can be located in the NIST vulnerability database. A successful test will be to find and document vulnerabilities and provide solutions to correct these issues.…

    • 869 Words
    • 4 Pages
    Better Essays
  • Better Essays

    Nmap now in version 4.0 is an open source scanner. It test can test your firewall and network applications whether hidden or not. Nmap also tests the intrusion detection system (IDS). Nmap is fairly easy to use and a simple scan just scratches the surface of the capabilities the program can do for you in a network vulnerability scan. There is also a website dedicated to the commands you can enter into nmap and usage scenarios that you may encounter. At the very core, nmap uses a system of 11 scan techniques, all with different customizations (Fellinge 2006). The newer version of nmap allows users now to run the make certain changes to the program without having to restart the application, this new feature sets a milestone in the online hacking…

    • 838 Words
    • 4 Pages
    Better Essays
  • Good Essays

    AIS Homework

    • 499 Words
    • 2 Pages

    Nessus -Tenable Network Security offers Nessus as a free scanner for non-commercial use, with a subscription license required for commercial organizations. Nessus has long been a favorite vulnerability scanner for people due to its speed, accuracy, and depth. Large vulnerability libraries can mean long times for scans. Currently there are over 28K plugins available, with automatic updates possible for new plugins. Nessus 4 is one of the fastest scanners used.…

    • 499 Words
    • 2 Pages
    Good Essays