Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Every IoT device found with vulnerabilities, expand on 2 or more issues and discuss how to rectify the issues and how to improve on those

Every IoT device found with vulnerabilities, expand on 2 or more issues and discuss how to rectify the issues and how to improve on those not reoccurring again. Identify those vulnerabilities found and write on each based on the solution you suggest going forward.

Router: Hosts: 1 Vulnerabilities: 15 Scan Date: February 13 Vulnerability Categories: SMB (Multiple issues), Microsoft Windows (Multiple issues), DCE Services Enumeration, Authenticated Check: OS Name and Installed Package Enumeration, Common Platform Enumeration (CPE), Ping the remote host, VMware ESX/GSX Server detection Top Threats: VPR Filter: 15 vulnerabilities Severity Levels: Critical, High, Medium, Low Device Type: General Info: SMB Signing not required, Host Fully Qualified Domain Name (FQDN) Resolution, Nessus Scan Information, OS Identification and Installed Software Enumeration over SSH v2 (Using New SSH Library), OS Security Patch Assessment Not Available, Target Credential Status by Authentication Protocol - No Credentials Provided 2. Nintendo Switch: Hosts: 1 Vulnerabilities: 7 Scan Date: February 14 Vulnerability Categories: ICMP Timestamp Request Remote Date Disclosure, OS identification, Ping the remote host Top Threats: VPR Filter: 7 vulnerabilities Severity Levels: Critical, High, Medium, Low Device Type: General Info: Ethernet Card Manufacturer Detection, Nessus Scan Information 3. Smartphone: Hosts: 1 Vulnerabilities: 5 Scan Date: February 14 Vulnerability Categories: Ethernet MAC Addresses, ICMP Timestamp Request Remote Date Disclosure, Nessus Scan Information, Ping the remote host, Traceroute Information Top Threats: VPR Filter: 5 vulnerabilities Severity Levels: Critical, High, Medium, Low Device Type: General 4. SmartTV: Hosts: 1 Vulnerabilities: 4 Scan Date: February 14 Vulnerability Categories: Ethernet Card Manufacturer Detection, Ethernet MAC Addresses, Nessus Scan Information, Ping the remote host Top Threats: VPR Filter: 4 vulnerabilities Severity Levels: Critical, High, Medium, Low Device Type: Misc. 5. Laptop: Hosts: 1 Vulnerabilities: 17 Scan Date: February 15 Vulnerability Categories: SMB (Multiple issues), Microsoft Windows (Multiple issues), DCE Services Enumeration, Authenticated Check: OS Name and Installed Package Enumeration, Common Platform Enumeration (CPE), Inconsistent Hostname and IP Address, Ping the remote host, VMware ESX/GSX Server detection Top Threats: VPR Filter: 17 vulnerabilities Severity Levels: Critical, High, Medium, Low Device Type: General Info: SMB Signing not required, Asset Attribute: Fully Qualified Domain Name (FQDN), OS Identification, OS Identification and Installed Software Enumeration over SSH v2 (Using New SSH Library), OS Security Patch Assessment Not Available, Target Credential Status by Authentication Protocol - No Credentials Provided February 20, 2023

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Database Driven Web Sites

Authors: Mike Morrison, Joline Morrison

1st Edition

061901556X, 978-0619015565

More Books

Students also viewed these Databases questions

Question

What are the advantages and disadvantages of buying a franchise?

Answered: 1 week ago