discussion

Writing

Clayton State University

Question Description

Overview

One of the key components of an information security program is ensuring that potential attacks and anomalous activities are detected in a timely fashion. This action is accomplished using intrusion detection and prevention systems (IDS or IPS). In order to increase security governance and posture, many organizations may also perform penetration and ethical hacking testing, which can be useful in detecting security vulnerabilities before others.


Address each of the following in the Word document that contains your lab screenshots. Clearly label each section.

  1. Compare and contrast the uses of NetWitness Investigator and Wireshark used in the lab. Why would a network administrator use Wireshark and NetWitness Investigator together?
  2. Interpret the results of the Wireshark and NetWitness scans performed in the lab. Describe the area of network vulnerability found in each scan.
  3. Describe the security risk associated with the vulnerability you discovered.
  4. Suggest a security control that you would use to address the vulnerability and explain why it is appropriate.
  5. Explain in detail the results returned from the Zenmap reconnaissance.

discussion
attachment_1
Student has agreed that all tutoring, explanations, and answers provided by the tutor will be used to help in the learning process and in accordance with Studypool's honor code & terms of service.

This question has not been answered.

Create a free account to get help with this and any other question!

Similar Questions
Related Tags