18 Apr 2022

98

Ethical Hacking and Net Defense

Format: APA

Academic level: College

Paper type: Coursework

Words: 366

Pages: 2

Downloads: 0

The operating environment of the appeared properly guarded with a number firewalls protecting the networks from any intrusion by unauthorized parties. In addition, the Apache web browser equally appeared to be working normally with the computer’s operating system, thereby enabling a smooth operation of softwares and hardwares. In addition to the security and protection of the system from unwarranted access by outsiders, the system administrator also had anti-virus softwares in place, particularly installed to detect any malware intrusion from hackers and cyber criminals.

In this regard, it was apparent that the system was somewhat secure from unwarranted access by unauthorized persons. However, there was still necessity to undertake a vulnerability scan of the system to ensure it was foolproof. As such, we engaged the services of vulnerability scanners to identify any loopholes in the system. Performing a vulnerability scan enables the system administrator to assess the weaknesses in computers and computer systems, as well as in their networks and applications. Therefore, vulnerability scans can be conducted as part of vulnerability management of the system by those in charge of protecting the system from intrusion, or by black hat attackers working to gain unwarranted access to the network systems. 

It’s time to jumpstart your paper!

Delegate your assignment to our experts and they will do the rest.

Get custom essay

System vulnerability refers to a weakness in computer security whereby an attacker can take advantage of to access the system through reduction of the information assurance of the system. In this regard, the vulnerability scan intersects three major elements of computer systems, which are a system flaw of susceptibility, attackers’ access to the flaw, and the capability of the attacker to exploit the flaw. In this regard, the system administrators can employ a number of vulnerability scanners in assessing the flaws of the system. Examples of good vulnerability scanners that can be used to assess the susceptibility of the system include Vega scanners and Nessus scanners. 

Nessus and Vega scanners are remote security tools used in scanning the system. As such, they scan the computers and network systems to identify vulnerabilities and raise an alert in the event they stumble upon any vulnerability in the system that malicious hackers and cyber criminals can exploit to gain access to any computer system connected to a network. Other vulnerability scanners include OpenVas, Retina CS Community, Microsoft Baseline Security Analyzer (MBSA), Nexpose Community Edition, SecurityCheq, and Qualys FreeScan. Examples of vulnerabilities unearthed during the vulnerability scan include security misconfiguration, broken authentication and session management, sensitive data exposure, buffer overflows, and injection vulnerabilities. 

Illustration
Cite this page

Select style:

Reference

StudyBounty. (2023, September 15). Ethical Hacking and Net Defense.
https://studybounty.com/ethical-hacking-and-net-defense-coursework

illustration

Related essays

We post free essay examples for college on a regular basis. Stay in the know!

Security Implication of the Internet of Things

The Internet of Things (IoT) can be described as s system of interconnected devices that have the ability to transfer information over a computer network without the need of human-to-computer or human-to-human...

Words: 892

Pages: 3

Views: 96

Modern Day Attacks Against Firewalls and VPNs

Introduction The need to have an enhanced security of the computer connectivity happens to be one of the reasons that attract companies and organizations towards wide usage of VPNs. Several simple techniques...

Words: 2025

Pages: 7

Views: 134

How to Deploy and Administer Windows Server 2012

Securing a reliable, and expandable configuration for a company is important to build a strong network. The new and enhanced features of the Windows Server 2012 can be used to implement the network. In this...

Words: 1673

Pages: 6

Views: 87

Deployment Model in Cloud Computing

Deployment model is a representation of a cloud environment primarily distinguished by parameters such as accessibility, proprietorship, and storage size. The National Institute of Standards and Technology gives the...

Words: 254

Pages: 1

Views: 81

How to Use Web Search Engines for Business Research

The advancement of technology has made it possible for many people around the world to have easy access to information whenever they want. The development of the Wide World Web-enabled different kinds of information...

Words: 773

Pages: 3

Views: 86

Distributed Database Management System (DDBMS)

Introduction Data management has been a headache to many technology enthusiasts for quite a long period of time. They have successfully managed to logically collect interrelated data and share it. If the data is...

Words: 799

Pages: 3

Views: 127

illustration

Running out of time?

Entrust your assignment to proficient writers and receive TOP-quality paper before the deadline is over.

Illustration