Ask DBMS Expert


Home >> DBMS

Vulnerability Assessment and Management

ADD REFERENCES!!!

The template document should follow this format:

• Vulnerability Assessment Project Document Shell
• Use Microsoft Word
• Title Page

o Course number and name
o Project name
o Student name
o Date

• Table of Contents

o Use auto-generated TOC.
o Separate page
o Maximum of three levels deep
o Be sure to update the fields of the TOC so it is up-to-date before submitting your project.

• Section Headings (create each heading on a new page with TBD as content except for sections listed under New Content below)

o Intrusion Tools and Techniques
o Common Vulnerabilities and Exposures
o Attack Methods
o Intrusion Detection System Policies
o Protective Measures

Each Part you will add to this document and submit for grading, as a preview each Section will contain the following:

• Intrusion Tools and Techniques (Part 1 - IP)

o Intrusion Detection
o Auditing
o Audit Data Review

2-pages

• Common Vulnerabilities and Exposures (Part 2 - IP)

o Definition of CVE
o Calculation of CVSS
o The use of the NVD

- The management team is interested in knowing what potential vulnerabilities exist for your environment. Take this opportunity to review common vulnerabilities specific to your environment and provide the following information:

1. Define what the CVE database is designed to provide to security researchers.
2. Describe how the CVSS score is calculated.
3. Describe the difference between base and temporal metrics.
4. Describe what the National Vulnerability Database is and used for.
5. Find and describe three vulnerabilities that could potentially exist in your organization, that have a CVSS severity rated as high.---

2-pages

Add the discussion about CVE, CVSS and NVD to The Key Assignment Template section titled: Common Vulnerabilities and Exposures

• Attack Methods (Part 3 - IP)

o A discussion about various attack mechanisms and vectors, including:

- Authenticated and Unauthenticated
- Active and Passive

- The team liked the information you provided about authenticated and unauthenticated attacks, but they are still a little confused about the difference between active and passive attacks and how they relate to the authenticated attacks previously described. Take this opportunity to describe how active and passive attacks work and the authenticated and unauthenticated attacks tie together with them. Address the following and add your responses to your final Key Assignment:

1. A description of active attacks.
2. A description of passive attacks.
3. 3 examples of each (6 total) but ensure that 3 are Windows based and 3 are UNIX based.
4. Include a discussion talking about how authenticated and unauthenticated attacks are used during passive and active attacks.---

2-pages

Add the discussion about the attack methods and examples to the section titled: Attack Methods.

• Intrusion Detection System Policies (Part 4 -IP)

o Policies

- The project is going well so far, and the analysis and discussion of the vulnerabilities was well-received. You realize that when vulnerability scanning takes place, employees need to know what the expectations are for handling the findings. You want to ensure that the policies and expectations for action are in place. Discuss the following:

• The purpose of a policy
• Create a policy for your organization that will cover one of the following (choose just 1):

o Intrusion Detection
o Incident Handling
o Vulnerability Assessment and Handling----

2-pages

Add the discussion about the definition of a policy and the sample policy to the section titled: Intrusion Detection System Policies.

• Protective Measures (Part 5 - IP)

o Vulnerability Assessment

- The management team as well as your peers are happy with the work performed to this point:

• Setting up Intrusion Detection Systems and audit data.
• Defining and understanding vulnerabilities
• Identifying various attack mechanisms
• Creating a policy

The last and final step is to perform a vulnerability assessment against a workstation, server or combination and analyze the findings. Recommend the solutions to remediate any serious issues based on the established company policies.

It is important to know and understand the security posture of the devices attached to the network, as these might often be a step in a more sophisticated and multilevel attack of the infrastructure. An important step in the risk management process is to determine what vulnerabilities exist on these devices. Choose a vulnerability assessment tool and perform a vulnerability assessment against your target(s) in your environment, and report the findings. The information should include:

• A description about the tool used to perform the scan.
• A list of identified hosts (Obfuscate any specific IP addresses).
• The list of serious (on a scale of 1-5 (1 being the highest) report the 1 and 2 issues)
• Describe or list any false positive information.
• Discuss potential safeguards and remediation actions that could be implemented for each finding to reduce the risk.

At this point the Key Assignment Template is Complete. The following Sections should be completed, and ensure to incorporate any feedback previously received from the instructor and peer reviews:

o Title Page
o Table of Contents (Updated to reflect correct page numbers)
o Intrusion Tools and Techniques
o Common Vulnerabilities and Exposures
o Attack Methods
o Intrusion Detection System Policies
o Protective Measures
o References

Add the discussion about the scan, the analysis and results and the remediation suggestions to the section titled: Protective Measures.

DBMS, Programming

  • Category:- DBMS
  • Reference No.:- M92315674

Have any Question?


Related Questions in DBMS

Data mining assignment -in this assignment you are asked to

Data Mining Assignment - In this assignment you are asked to explore the use of neural networks for classification and numeric prediction. You are also asked to carry out a data mining investigation on a real-world data ...

Sql query assignment -for this assignment you are to write

SQL Query Assignment - For this assignment you are to write your answers in a word document. This assignment is in three parts: Part A (reporting queries), Part B (query performance), Part C (query design). For this assi ...

The groceries datasetimagine 10000 receipts sitting on your

The groceries Dataset Imagine 10000 receipts sitting on your table. Each receipt represents a transaction with items that were purchased. The receipt is a representation of stuff that went into a customer's basket. That ...

You are in a real estate business renting apartments to

You are in a real estate business renting apartments to customers. Your job is to define an appropriate schema using SQL DDL in MySQL. The relations are Property(Id, Address, NumberOfUnits), Unit(ApartmentNumber, Propert ...

Objectivethe objective of this lab is to be familiar with a

OBJECTIVE: The objective of this lab is to be familiar with a process in big data modeling. You're required to produce three big data models using the MS PowerPoint software. This tool is available on UMUC Virtual Deskto ...

The relation memberstudentid organizationid roleid stores

The relation Member(StudentId, OrganizationId, RoleId) stores the membership information of student joining organization. For example, ('S1', 'O2', 'R3') indicates that student with Id 'S1' joined the organization with i ...

Relational database exerciseyou have been assigned to a new

Relational Database Exercise: You have been assigned to a new development team. A client is requesting a relational database system to manage their present store with the anticipation of adding more stores in the future. ...

Relational database design a given the following business

Relational Database Design A) Given the following business rules, identify entity types, attributes (at least two attributes for each entity, including the primary key) and relationships, and then draw an Entity-Relation ...

We can represent a data set as a collection of object nodes

We can represent a data set as a collection of object nodes and a collection of attribute nodes, where there is a link between each object and each attribute, and where the weight of that link is the value of the object ...

Data model development and implementationpurpose of the

Data model development and implementation Purpose of the assessment (with ULO Mapping) The purpose of this assignment is to develop data models and map Database System into a standard development environment to gain unde ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As