Urgenthomework logo
UrgentHomeWork
Live chat

Loading..

CYB205 Individual Inventory Assets on Network

Questions:

1.Write a brief description of a vulnerability found in the scan, including the operating system on which it was found, its risk factor, and its CVSS scores. The vulnerability found in the scan was
2.Are the results of default scans different than the credentialed scan? The default scan showed no issues, but the credentialed advanced scan did show issues. The credentialed advanced scan helped find the vulnerabilities in the systems, while the advanced scan did not. 
3.Why might that be? A default scan is used to find general problems in a system, while an advanced scan goes more in depth on what needs to be fixed.
4.What types of vulnerabilities might an attacker without any credentials be able to identify and exploit? DDoS attacks, Trojans, and Worms.
5.This was a simple three computer LAN. How much more complicated would this process be for 100 computers? What about an enterprise with 10,000 computers on their LAN/WAN? With 100 computers, it would take a long time to scan each item. The process is easy, but time consuming. There would have to be at least 5 different IT administrators to fully complete all these scans on time. If there were an enterprise with 10,000 computers there would have to be at least 20 IT administrators to take on the job of scanning every computer. If just one administrator were to handle everything alone whether with 100 or 10,000 computers, it would take him or her a long time to complete the full scanning to prevent vulnerabilities from appearing.
Consider a cloud-hosted Infrastructure as a Service (IaaS) environment with many new, internet-accessible systems regularly being built and brought online. What advantages or 6.challenges might there be with regard to vulnerability management in the cloud? The advantages would be employees being able to easily access work being shared with others in a project that they are working on together. The disadvantage is problems with security. A cloud must be a secure cloud for employees to share sensitive information amongst each other, only if they have security clearances. Most clouds are not secure, which create problems for employees who deal with sensitive information. Clouds that are not secured must only have unclassified information and data in it to prevent sensitive information from leaking.

Answer:

The vulnerability component that could be identified in the scan is the windows operating system. The CVSS score is found to be more than 7, which signifies high risk due to the reason that an attacker can


easily gain access to the database. The results in default scan are different because in default scan, the presence of a default user account may be considered as being multiple or single authentications. This may, however, have a high risk if the credentials are exposed to the public. The vulnerabilities, including Distributed Denial of Service DDoS, Trojan and worm vulnerabilities can be identified in the system. The DDoS is shown by traffic from numerous sources which overwhelm the system. The Trojan vulnerability is shown by various payloads, this may be exploited by an intruder to install additional malicious software into the system to expand the access into the system to the hackers (Benjamin, 2010). The worms are due to the vulnerabilities in the computer operating system. It exploits the vulnerability in the network service present in the Windows operating system and may damage the entire system if not given immediate attention. For a computer LAN with 100 computers or more. More computer administration centers will be needed to aid in scanning the system since the system become complicated as it expands thus scanning it may take longer with one system administrator. In the Infrastructure as a Service (IaaS) environment, the system will experience several advantages as well as a few limitations including security issues among others (Apostu, Puican, Ularu, Suciu, & Todoran, 2013). Despite the disadvantages, the IaaS still remains strong and has a great potential for the futures.  

Reference

Apostu, A., Puican, F., Ularu, G., Suciu, G., & Todoran, G. (2013). Study on advantages and disadvantages of Cloud Computing–the advantages of Telemetry Applications in the Cloud. Recent Advances in Applied Computer Science and Digital Services, 2103.

Benjamin, P. (2010). U.S. Patent No. 7,784,099. Washington, DC: U.S. Patent and Trademark Office.


Buy CYB205 Individual Inventory Assets on Network Answers Online

Talk to our expert to get the help with CYB205 Individual Inventory Assets on Network Answers to complete your assessment on time and boost your grades now

The main aim/motive of the management assignment help services is to get connect with a greater number of students, and effectively help, and support them in getting completing their assignments the students also get find this a wonderful opportunity where they could effectively learn more about their topics, as the experts also have the best team members with them in which all the members effectively support each other to get complete their diploma assignments. They complete the assessments of the students in an appropriate manner and deliver them back to the students before the due date of the assignment so that the students could timely submit this, and can score higher marks. The experts of the assignment help services at urgenthomework.com are so much skilled, capable, talented, and experienced in their field of programming homework help writing assignments, so, for this, they can effectively write the best economics assignment help services.

Get Online Support for CYB205 Individual Inventory Assets on Network Assignment Help Online

Copyright © 2009-2023 UrgentHomework.com, All right reserved.