Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Vulnerability Management Using In this project, you will do research on the vulnerability analysis of an operating system or application or protocol of your choice.

image text in transcribed

Vulnerability Management Using In this project, you will do research on the vulnerability analysis of an operating system or application or protocol of your choice. Examples are Windows desktop OS, Mac OS, Android, Linux, iOS, Oracle, HTTP. Just choose any one. What to do: (K)nowledge: Learn about vulnerabilities (zero-day and non-zero-day) in general, their relation to exploits and attacks. Need minimum 2 citations. (K)nowledge: Learn about minimum two attacks for which now we know vulnerability, exploits, and countermeasure. Need minimum 1 citation. (S)kills: Go to the national vulnerability database (NVD) and one more website that you find by research and get the vulnerability data for the last 10 years of the system that you chose. Need minimum of one citation. (S)kills: Find a tool or a set of best practices used for checking the selected software for vulnerabilities. Examples are Zeek, Nessus, etc. Find an article that discusses the use of the tool you chose. Need minimum one citation. (S)kills: Install and test the tool. (A)bility: Apply the tool on an actual system that you choose to study. Get reportable results whether you detect a vulnerability or not. In your report: (K)nowledge: (i) Show that you understand the meanings or and relation between vulnerabilities, exploits, and attacks. (5%) (ii) Describe how vulnerabilities and exploits were used to launch two attacks of the system of your choice. (5%) (iii) Show the data on vulnerabilities of your choice that you gathered from NVD and the other sight. Use illustration(s), such as plots, tables, diagrams. (10\%) (S)kills: (iv) Show that you did proper search to choose the tool (compare at least two tools to justify the use of the tool of your choice, or at least cite an article that used the tool and describe why YOU chose it too). (10%) (v) Show the proof of installation of the tool and describe the installation experience, such as how much hard disk space it needed, how long it took to download and install, how you tested it. (10%) (A)bilities: (vi) Describe your experiment goals, how you completed the experiment, and the result of your experiment. (vii) Include Conclusions and References in your report. Refer to the rubric for the credit for conclusions and references

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Advances In Databases And Information Systems Second East European Symposium Adbis 98 Poznan Poland September 1998 Proceedings Lncs 1475

Authors: Witold Litwin ,Tadeusz Morzy ,Gottfried Vossen

1st Edition

3540649247, 978-3540649243

More Books

Students also viewed these Databases questions

Question

To maintain a positive image with job applicants, amc widget

Answered: 1 week ago

Question

3. Identify the methods used within each of the three approaches.

Answered: 1 week ago