Question

In: Computer Science

As vulnerability scanning is typically thought of as a proactive or preventative activity, discuss how it...

As vulnerability scanning is typically thought of as a proactive or preventative activity, discuss how it relates to incident and forensics investigations. Consider how vulnerability scanning can be used to enhance information about events and/or assist in recovery

Solutions

Expert Solution

Vulnerability scanning is typiclly thought of as a proactive or preventive activity and relates to incident and forensics investigation --

  • Vulnerability scanning is an automated process of proactively identify application, network and security vulnerability. and it is performed by IT department of the organization and third party security service provider.
  • The main type of vulnerability scanning include -- unix, linux, windows, on prem, offsite and onsite.
  • And the network vulnerability scan include -- External vulnerability scan
  • Internal vulnerability scan
  • Enivironmental scan
  • Intrusive and non intrusive method.
  • Scanning methods.
  • Vulnerability scanning allows you to take a proactive approach maintain strong security for the system, data, employees and customers.
  • The data breaches sometime results unpatched vulnerability so it identify and eliminate security gaps and remove that attack vector.
  • Cyber criminals can access vulnerability scanning tools so it is very important to carry out scans and take action before hackers damaged security vulnerabilities.
  • The cybersecurity has big demand of secure system for example -- PCI, DSS, NIST, and HIPAA. all these emphasize vulnerability scanning to protect sensitive data.

Vulnerability scanning can be used to enhance information about events and assist in recovery --

  • Nowdays cyberattacks are increasing day by day so it is very important to understand events or organizational risks and vulnerabilities and current threats and most effective policies and technologies to address them.
  • Vulnarability scanning can be used in enhancment of information system about events and assist in recovery by understanding mission critical process and underlying infrastructure and apply the understanding to the result.
  • The vulnerability assessment include three phases at technical level. in first phase - organizations need to gather information about hardware and software present in their environment.
  • This include network scanning to identify host, port scanning to identify service and protocol that may be vulnerable and collect DNS information to understand which host can be targeted by attackers.
  • The second phase is - Review and enumeration of operating system, ports, protocol, and services which is identified by the extent of the attack surface vulnerable to attackers.
  • For example -- SMB 3.1.1 vs SMB 2.0 and Windows 10 vs windows XP.
  • The Third pahse include detection and reporting - this process generates reports, complete with scores and risk information. and use the remediation tools to patch, debug and configure to eliminate the security risks.

Related Solutions

Discuss the importance of environmental scanning and explain how the founders of Airbnb scanned the environment...
Discuss the importance of environmental scanning and explain how the founders of Airbnb scanned the environment before starting their company. NB: Your answer should be a minimum of 500 to a maximum of 650 words. Markers are to stop marking after the threshold of 600 words has been reached. Please indicate the word count at the end your answer.
Discuss how education can be used to put a stop to vulnerability of learners. (15 marks)
Discuss how education can be used to put a stop to vulnerability of learners.
Discuss how companies can be proactive rather than reactive when responding to environmental trends.
Discuss how companies can be proactive rather than reactive when responding to environmental trends. 
Decision Theory: Discuss how sensitivity analysis can be utilized in cost control using examples when preventative...
Decision Theory: Discuss how sensitivity analysis can be utilized in cost control using examples when preventative or detective objective measure values are not available.  
Scanning Tools How does IP protocol scanning work, consider the various type and tools? What are...
Scanning Tools How does IP protocol scanning work, consider the various type and tools? What are some of the most popular scanner tools and why? Sniffers Where are sniffers normally placed? What are the components of a sniffer and what are the most popular sniffer and why?
Discuss the role of the nursing staff as part of a proactive risk management program in...
Discuss the role of the nursing staff as part of a proactive risk management program in a healthcare organization. Discuss two methods that could be used by a nurse manager to encourage his or her staff to be part of risk reduction in a clinical area.
Compare and contrast a responsive with a proactive market orientation. Be sure to discuss the pros...
Compare and contrast a responsive with a proactive market orientation. Be sure to discuss the pros and cons of each, as well as the types of approaches used to gather information for each orientation.
Describe the difference between preventative and detective controls and discuss the strengths and weaknesses of each.
Describe the difference between preventative and detective controls and discuss the strengths and weaknesses of each.
discuss about further into COBIT and the 3 types on controls: preventative, detective and corrective.
discuss about further into COBIT and the 3 types on controls: preventative, detective and corrective.
Dave Fletcher was able to determine the activity times for constructing his laser scanning machine. Fletcher...
Dave Fletcher was able to determine the activity times for constructing his laser scanning machine. Fletcher would like to determine​ ES, EF,​ LS, LF, and slack for each activity. The total project completion time and the critical path should also be determined. Here are the activity​ times: Activity   Time (weeks)   Immediate Predecessor(s)   Activity   Time (weeks)   Immediate Predecessor(s) A 6 - E 3 B B 7 - F 7 B C 2 A G 9 C, E D 1 A    H...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT