Essay Available:
page:
4 pages/≈1100 words
Sources:
3
Style:
APA
Subject:
IT & Computer Science
Type:
Coursework
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 25.92
Topic:
UPDATED PAGES VM Scanner Evaluation Background Report
Coursework Instructions:
You should link your analysis to the kinds of organizational functions and data associated with a transportation company (e.g., protecting order data, customer lists, sales leads, Payment Card Industry (PCI) compliance for processing credit, proprietary software, etc.) and provide your recommendation if Mercury USA should purchase the Nessus tool. This report should be four to six pages in length and include a title/cover page. Include in-text citations and a reference page with three quality sources in a citation style of your choice.
How Will My Work Be Evaluated?
For this assignment, you are asked to provide your supervisor, Judy, with a technical evaluation of a vulnerability scanner. By documenting your results in an effective background report, you are showing how you use your technical knowledge to convey your ideas to others in a professional setting. Your ability to express your findings using the right mix of technical detail in a business context is an important workplace skill.
The following evaluation criteria aligned to the competencies will be used to grade your assignment:
1.3.1: Identify potential sources of information that can be used to develop and support ideas.
1.4.1: Produce grammatically correct material in standard academic English that supports the communication.
10.1.1: Identify the problem to be solved.
12.2.1: Identify systems for the risk assessment.
12.3.1: Select controls.
13.2.1: Evaluate vendor recommendations in the context of organization requirements.
If you haven’t already downloaded it last week, download the VM Scanner Background Report Template now and follow the instructions in the document.
Delete the instructional text from the template before you submit.
----
Update from the client:
I have already completed the screenshot part of the instructions
I added the rough draft that was submitted to my instructor. Along with the rubric which highlights in bold what needs to be added for a better grade. Please use this guidance when completing the assignment.
There is one part of this assignment that requires a screenshot from a lab. Please copy the screenshot from the Assignment_Submission_1_Threat_Management attachment
Coursework Sample Content Preview:
VM Scanner Background Report
CMIT 421 6380 Threat Management and Vulnerability Assessment
< 4th March 2024>
Table of Contents TOC \o "1-3" \h \z \u Introduction PAGEREF _Toc160540868 \h 2Part 1: Nessus Vulnerability Report Analysis PAGEREF _Toc160540869 \h 2Part 2: The Business Case PAGEREF _Toc160540871 \h 3Part 3: Nessus Purchase Recommendation PAGEREF _Toc160540872 \h 4Conclusion PAGEREF _Toc160540873 \h 4References PAGEREF _Toc160540874 \h 5
Introduction
Mercury USA, a transportation company, recently received a report that their competitors were recently victims of cybercrime, and chances were high that the company was the next victim considering how cybercriminals operate. As a transportation company it stores massive customer Personally Identifiable Information (PII), which includes order information, customer details, and Payment card data, the key priority considering the risks of falling victim to cyber-attack, is to find a way to protect its critical systems. First, the company will need to conduct a Nessus vulnerability scan to determine its system vulnerabilities and then act proactively to prevent any potential harm to its assets. With a thorough analysis of Mercury USA's security issues and recommendations, this paper seeks to offer recommendations and solutions that align with Mercury CEO’s security concerns and priorities.
Part 1: Nessus Vulnerability Report Analysis
Nessus Vulnerability Report offers extensive information on the company’s vulnerability stand, with each vulnerability measured and interpreted based on its ability to compromise critical organizational operations and data. According to the Nessus vulnerability scan report the critical vulnerabilities for host the four hosts namely 192.168.1.10, 192.168.1.25, 192.168.1.30, and 192.168.1.100 reveal 5 critical concerns (all with CVSSv2.0 high at 10.0), and 3 high vulnerabilities each occurring at host 192.168.1.10, 192.168.1.25, and 192.168.1.30 respectively. The overall indication of the security scan report is that the company systems are safe except for host 192.168.1.30. The critical concerns in host 192.168.1.30 and high vulnerabilities in the three other hosts reveal that the major lapses are attributed to user’s overall inability to conduct periodic cumulative updates, cumulative updates (KRACK), and security updates on their operating systems. All these issues cumulatively present a high-risk level of operational activities and data integrity to Mercury USA.
Figure SEQ Figure \* ARABIC 1: Nessus Vulnerability Report
Accordingly, the lack of security updates and cumulative updates brings about two major security issues. First, Softić (2022) states that the use of an outdated operating system software version or total lack of cumulative updates increases the risk of being hacked three-fold. This is because an outdated system offers hackers an easy entry point into a system using more sophisticated payloads that are often hard to detect. On the other hand, an up-to-date system or time-to-time system update as seen with host 192.168.1.100 minimizes vulnerabilities, which remains crucial in safeguarding against advanced types of cyber-attacks including malware such as phishing scams and ransomware (Zafar, 2023). Ideally, security remains a critical reason why Microsoft conducts periodic software updates and through the time to time updates they improve and recr...
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:
👀 Other Visitors are Viewing These APA Essay Samples:
-
M365 Application Workloads Template
2 pages/≈550 words | No Sources | APA | IT & Computer Science | Coursework |
-
Project 1: Reconnaissance
6 pages/≈1650 words | 10 Sources | APA | IT & Computer Science | Coursework |
-
Project 2: Discovery
5 pages/≈1375 words | 10 Sources | APA | IT & Computer Science | Coursework |