Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

The management team as well as your peers are happy with the work performed to this point: Setting up Intrusion Detection Systems and audit data.

The management team as well as your peers are happy with the work performed to this point:

  • Setting up Intrusion Detection Systems and audit data.
  • Defining and understanding vulnerabilities
  • Identifying various attack mechanisms
  • Creating a policy

The last and final step is to perform a vulnerability assessment against a workstation, server or combination and analyze the findings. Recommend the solutions to remediate any serious issues based on the established company policies.

It is important to know and understand the security posture of the devices attached to the network, as these might often be a step in a more sophisticated and multilevel attack of the infrastructure. An important step in the risk management process is to determine what vulnerabilities exist on these devices. Choose a vulnerability assessment tool and perform a vulnerability assessment against your target(s) in your environment, and report the findings. The information should include:

  • A description about the tool used to perform the scan.
  • A list of identified hosts (Obfuscate any specific IP addresses).
  • The list of serious (on a scale of 1-5 (1 being the highest) report the 1 and 2 issues)
  • Describe or list any false positive information.
  • Discuss potential safeguards and remediation actions that could be implemented for each finding to reduce the risk.

PLEASE GIVE REFERENCE AND INTEX CITATION! THANK YOU

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Object Databases The Essentials

Authors: Mary E. S. Loomis

1st Edition

020156341X, 978-0201563412

More Books

Students also viewed these Databases questions