Sign In
Not register? Register Now!
You are here: HomeEssayIT & Computer Science
Pages:
3 pages/≈825 words
Sources:
No Sources
Level:
APA
Subject:
IT & Computer Science
Type:
Essay
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 16.2
Topic:

Vulnerability Report IT & Computer Science Essay Paper (Essay Sample)

Instructions:

VULNERABILITY report

source..
Content:


Vulnerability Report
Student Name
Institution Affiliation
Prompt: ABC Manufacturing
ABC manufacturing has hired me to identify security vulnerabilities, provie recommendations and implement approved changes. I have been provided with access to the company’s server networking environment. Nonetheless, after opening the server, the technician was not familiar with the firewall appliance and thus may have made a mistake by opening more ports than necessary.
In this report, I will identify parts of the network that need to be examined and assess these areas suing risk criteria. After identifying risks and threats, I will provide recommendations to address these issues, prioritize the strategies and explain the rationale behind the same.
Network Security Assessment
Firewall
Upon analyzing the firewall for threats and open/unused ports exposed to the public, there exists many. An analysis using NMAP from an external machine showed that the following ports were open: 21 ftp, 23 telnet, 25 smtp, 80 http, 110 pop3, 443 https, 1099 rmiregistry, 3306 mysql, 3389 ms-wbt-server, 5432 postgresql, and 8180 unknown (see Figure 1).

Figure 1. Open Ports on Firewall from External Scan
Virtual Machine
The threats to the host machines included in this are Remote Desktop (port 3389) as well as 2 database ports (3306 MySQL & 5432 PostGreSQL). Many other ports are open on the host machines which could be compromised if an intruder were able to gain access to the internal network. Specifically, the Windows 10 Client had many, many open and unused ports which can be compromised (see Figure 2).
Figure 2. Windows 10 Client Open Ports

...
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

Other Topics:

  • Securing Computer of a Dismissed Person IT & Computer Science Essay
    Description: Employee separations or dismissal create critical conditions for IT departments. Although most of the IT experts concentrate on external threats, insiders usually pose the most serious threat to computer security. Dismissal may even sour a model employee’s opinion about the organization...
    2 pages/≈550 words| 2 Sources | APA | IT & Computer Science | Essay |
  • Types of Contracts Related to the Cyber Arena IT & Computer Essay
    Description: Three types of contracts related to the Cyber arena are Shrink Wrap Contracts, Click Wrap Contracts, and Browse Wrap Contracts. Shrink Wrap Contracts are filled with the products. However, the usage of certain products is considered as an approval of the terms and conditions of the Contract...
    1 page/≈275 words| 2 Sources | APA | IT & Computer Science | Essay |
  • Biometrics in Visual Design IT & Computer Science Essay
    Description: Visual plan is a basic part of any site page or UI, and its effect on a client's experience has been examined broadly. Research has demonstrated a positive connection between's a client's apparent ease of use and a client's appraisal of visual structure. Moreover, saw web quality, which envelops visual plan...
    2 pages/≈550 words| 7 Sources | APA | IT & Computer Science | Essay |
Need a Custom Essay Written?
First time 15% Discount!