Answered step by step
Verified Expert Solution
Question
1 Approved Answer
Vulnerability Management Using In this project, you will do research on the vulnerability analysis of an operating system or application or protocol of your choice.
Vulnerability Management Using In this project, you will do research on the vulnerability analysis of an operating system or application or protocol of your choice. Examples are Windows desktop OS, Mac OS, Android, Linux, iOS, Oracle, HTTP. Just choose any one. What to do: (K)nowledge: Learn about vulnerabilities (zero-day and non-zero-day) in general, their relation to exploits and attacks. Need minimum 2 citations. (K)nowledge: Learn about minimum two attacks for which now we know vulnerability, exploits, and countermeasure. Need minimum 1 citation. (S)kills: Go to the national vulnerability database (NVD) and one more website that you find by research and get the vulnerability data for the last 10 years of the system that you chose. Need minimum of one citation. (S)kills: Find a tool or a set of best practices used for checking the selected software for vulnerabilities. Examples are Zeek, Nessus, etc. Find an article that discusses the use of the tool you chose. Need minimum one citation. (S)kills: Install and test the tool. (A)bility: Apply the tool on an actual system that you choose to study. Get reportable results whether you detect a vulnerability or not. In your report: (K)nowledge: (i) Show that you understand the meanings or and relation between vulnerabilities, exploits, and attacks. (5%) (ii) Describe how vulnerabilities and exploits were used to launch two attacks of the system of your choice. (5%) (iii) Show the data on vulnerabilities of your choice that you gathered from NVD and the other sight. Use illustration(s), such as plots, tables, diagrams. (10\%) (S)kills: (iv) Show that you did proper search to choose the tool (compare at least two tools to justify the use of the tool of your choice, or at least cite an article that used the tool and describe why YOU chose it too). (10%) (v) Show the proof of installation of the tool and describe the installation experience, such as how much hard disk space it needed, how long it took to download and install, how you tested it. (10%) (A)bilities: (vi) Describe your experiment goals, how you completed the experiment, and the result of your experiment. (vii) Include Conclusions and References in your report. Refer to the rubric for the credit for conclusions and references
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started