Question

In: Computer Science

Write a brief description of a vulnerability found in the scan, including the operating system on...

  1. Write a brief description of a vulnerability found in the scan, including the operating system on which it was found, its risk factor, and its CVSS scores.
  2. Are the results of default scans different than the credentialed scan?
  3. Why might that be?
  4. What types of vulnerabilities might an attacker without any credentials be able to identify and exploit?
  5. This was a simple three computer LAN. How much more complicated would this process be for 100 computers? What about an enterprise with 10,000 computers on their LAN/WAN?
  6. Consider a cloud-hosted Infrastructure as a Service (IaaS) environment with many new, internet-accessible systems regularly being built and brought online. What advantages or challenges might there be with regard to vulnerability management in the cloud?

Solutions

Expert Solution

Write a brief description of a vulnerability found in the scan, including the operating system on which it was found, its risk factor, and its CVSS scores.
Answer:------
One vulnerability that CentOS 6/7 Firefox (CESA-20107) the risk factor was high, CVSS base Score is 9.3, the CVSS Temporal Score is at 6.9, CVSS Vector.CVSS2#AV: N/AC: Au: N/C:C/I:C/A:C, and the CVSS Temporal Vector is CVSS2#E: U/RL: OF/RC: C. This vulnerability lets you know that for Red Hat Enterprise Linux 6 and Red Hat Enterprise 7, there is an available update because multiple flaws were found in the processing of malformed web content. The update will fix issues such as preventing Firefox from crashing due to web pages containing malicious content for the host.

What types of vulnerabilities might an attacker without any credentials be able to identify and exploit?
Answer:------
Many of the vulnerabilities have the same patterns. sometimes computers in the same net-work would be a good way to find vulnerability. you can test each computer and with that you can.

This was a simple three computer LAN. How much more complicated would this process be for 100 computers? What about an enterprise with 10,000 computers on their LAN/WAN?
Answer:------
There are many different types of computer networks and each one can be different. De-pending on the are it can shows different types of vulnerability. depends on the types of networks they used.

Consider a cloud-hosted Infrastructure as a Service (IaaS) environment with many new, internet-accessible systems regularly being built and brought online. What advantages or challenges might there be with regard to vulnerability management in the cloud?
Answer:------
Being in a club if a good thing but it can also be vulnerable. The cloud can be access from a lot of places and you do not know what got into it. This would be sometimes a disadvantages of a cloud. You need a lot of security.


Related Solutions

Write a brief description of the emotions in the central nervous system
Write a brief description of the emotions in the central nervous system
write a brief description of the constitution?
write a brief description of the constitution?
Provide a brief description of the current Canadian healthcare system
Provide a brief description of the current Canadian healthcare system
Brief description of the role of the PMS ( Performance management system)  
Brief description of the role of the PMS ( Performance management system)  
Provide a brief description of the ethical dilemma, including your opinion on the ethical dilemma.
Provide a brief description of the ethical dilemma, including your opinion on the ethical dilemma.
Band Theory (A) Give a brief description of the formation of electron bands in crystals including...
Band Theory (A) Give a brief description of the formation of electron bands in crystals including reference to the atomic structure of the constituent atoms. (B) Explain the following i.Sodium, which has 2 atoms in a bcc (conventional cubic) unit cell, is a metal ii.Calcium, which has 4 atoms in a fcc (conventional cubic) unit cell, is a metal iii.Diamond, which has 8 atoms in a fcc (conventional cubic unit cell with a basis, is an electrical insulator, whereas silicon...
1.     Introduction: Brief description of the study including the purpose and importance of the research question...
1.     Introduction: Brief description of the study including the purpose and importance of the research question being asked. 2.     What is the null hypothesis? What is the research hypothesis? 3.     Participants/Sampling Method: Describe your sampling method. What is your sample size? Who is your population of interest? How representative is the sample of the population under study? 4.     Data Analysis: Describe the statistical analysis. What is your variable? What is its level of measurement? What is your alpha level? 5.    ...
Write a brief description of Hindrance to Oil and Gas Flow in Pipelines
Write a brief description of Hindrance to Oil and Gas Flow in Pipelines
Post by Day 4 a brief description of your quantitative study, including the dependent and independent...
Post by Day 4 a brief description of your quantitative study, including the dependent and independent variables. Explain how you would conceptualize and measure the dependent variable. Then explain why a quantitative approach would be more advantageous than a qualitative approach for this study. Finally, explain advantages and disadvantages of using quantitative research versus qualitative research
Provide a brief description of the qualitative characteristics of useful information including relevance/materiality and the cost...
Provide a brief description of the qualitative characteristics of useful information including relevance/materiality and the cost constraint.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT