IUOM Operating Systems Vulnerabilities Paper

User Generated

xfgebhq0319

Computer Science

university of maryland

Description

Unformatted Attachment Preview

Step 1: Define the OS The audience for your security assessment report (SAR) is the leadership of your company, which is made up of technical and nontechnical staff. Some of your audience will be unfamiliar with operating systems. Therefore, you will begin your report with a brief explanation of OS fundamentals and the types of information systems. Click to read the following resources that provide information you need to know before writing a thorough and accurate OS explanation: • • • • operating systems fundamentals information system architecture cloud computing web architecture After reviewing those resources, begin drafting the OS overview to do the following: 1. Explain the user's role in an OS. 2. Explain the differences between kernel applications of the OS and the applications installed by an organization or user. 3. Describe the embedded OS. 4. Describe how the systems fit in the overall information system architecture, of which cloud computing is an emerging, distributed computing network architecture. Include a brief definition of operating systems and information systems in your SAR. Step 2: Review OS Vulnerabilities You just summarized operating systems and information systems for leadership. In your mind, you can already hear leadership saying, "So what?" The company's leaders are not well versed in operating systems or in the threats and vulnerabilities in them, so you decide to include in your SAR an explanation of advantages and disadvantages of the different operating systems and their known vulnerabilities. Prepare by first reviewing the different types of vulnerabilities and intrusions explained in these resources: • • • • Windows vulnerabilities Linux vulnerabilities Mac OS vulnerabilities SQL PL/SQL, XML, and other injections Based on what you gathered from the resources, compose the OS vulnerability section of the SAR. Be sure to: • • explain Windows vulnerabilities and Linux vulnerabilities. explain the Mac OS vulnerabilities, and vulnerabilities of mobile devices. • • • • explain the motives and methods for intrusion of the MS and Linux operating systems. explain the types of security awareness technologies, such as intrusion detection and intrusion prevention systems. describe how and why different corporate and government systems are targets; and describe different types of intrusions such as SQL PL/SQL, XML, and other injections. You will provide the company's leadership with a brief overview of these vulnerabilities in your SAR. Step 3: Prepare for the Vulnerability Scan You have just finished defining the vulnerabilities an OS can have. Soon, you will perform vulnerability scanning and vulnerability assessments on the security posture of your company's operating systems. But first, consider your plan of action. Read these two resources to be sure you fully grasp the purpose, goals, objectives, and execution of vulnerability assessments and security updates: • • Vulnerability Assessments Patches Then provide the leadership with the following: • • • A description of the methodology you propose to assess the vulnerabilities of the operating systems, including an explanation of how this methodology will determine the existence of those vulnerabilities in your company's OS A description of the applicable tools to be used and any limitations of the tools and analyses, including an explanation of how your proposed applicable tools will determine the existence of those vulnerabilities in your company's OS The projected findings from using these vulnerability assessment tools In your report, discuss the strength of passwords, any Internet Information Services' administrative vulnerabilities, SQL server administrative vulnerabilities, and other security updates and management of patches, as they relate to OS vulnerabilities. Step 4: Review Vulnerability Assessment Tools for OS and Applications Vulnerability assessment is scanning a network for known security weaknesses. Vulnerability scanners are software tools designed to provide an automated method for conducting vulnerability scans across an entire network that may run into hundreds or even thousands of machines. According to EC-Council (2018), vulnerability scanners can help identify the following types of weaknesses: • • • • • • the OS version running on computers or devices IP and Transmission Control Protocol/User Datagram Protocol (TCP/UDP) ports that are listening applications installed on computers accounts with weak passwords files and folders with weak permissions default services and applications that might have to be uninstalled • • mistakes in the security configuration of common applications computers exposed to known or publicly reported vulnerabilities Additionally, vulnerability scanners can be used to help predict the effectiveness of countermeasures (security controls) and to test the effectiveness of those controls in the production network. Further, vulnerability scanners also have limitations, primarily in that they are only as effective as the supporting databases and/or plug-ins at a point in time. Large, automated vulnerability scanning suites also require maintenance, tuning, and frequent updates to be able to detect new vulnerabilities. Finally, scanning engines are prone to both false positives and negatives. That is where you as the cybersecurity professional will apply your deep knowledge of the environment, network, and applications in use. Two common vulnerability scanners used in industry are the free Open-Source scanner OpenVAS, and the commercial tool, Nessus. In this lab, you will use OpenVAS. Select the following links to learn more about OpenVAS and computer networks: • • OpenVAS Computer Networks Your leadership will want to understand the capabilities of the OpenVAS scanner, so you will need to include that information in your Security Assessment Report (SAR). Use the tool’s built-in checks to complete the lab. For details on accessing the lab, see the "Complete This Lab" box below. Use OpenVAS to complete the following: For the Windows OS: 1. 2. 3. 4. Determine if Windows administrative vulnerabilities are present. Determine if weak passwords are being used on Windows accounts. Report which security updates are required on each individual system. The tool provides a dynamic assessment of missing security updates. Scan one or more computers by domain, IP address range, or other groupings. 5. Once complete, provide a detailed report and recommendations on how to make your system a more secure working environment. In this case, the OpenVAS tool will create and store individual XML security reports for each computer scanned and will display the reports in the graphical user interface in HTML. For the Linux OS: 1. 2. 3. 4. Determine if Linux vulnerabilities are present. Determine if weak passwords are being used on Linux systems. Determine which security updates are required for the Linux systems. The tool provides a dynamic assessment of missing security updates. Scan one or more computers by domain, IP address range, or other groupings. 5. Once complete, provide a detailed report and recommendations on how to make your system a more secure working environment. Knowledge acquired from this Workspace exercise will help your company's client organizations secure the computer networks' resources and protect corporate data from being stolen. Validate and record the benefits of using these types of tools. You will include this in the SAR. References EC-Council (2018). Certified Ethical Hacker (CEH) Version 10 eBook (Volumes 1 through 4). [VitalSource Bookshelf]. Retrieved from https://bookshelf.vitalsource.com/#/books/9781635671919 Step 5: Create the Security Assessment Report By using the OpenVAS security vulnerability assessment tool from the previous step, you now have a better understanding of your system's security status. Use the results you obtained to create the Security Assessment Report (SAR) as part of your deliverables. In your report to the leadership, make sure to emphasize the benefits of using the security tool, and provide recommendations based on your findings. Remember to include analyses and conclusions in the SAR deliverable as follows: 1. After you provide a description of the methodology you used to make your security assessment, provide the actual data from the tools, the status of security and patch updates, security recommendations, and specific remediation guidance for your senior leadership. 2. Include any risk assessments associated with the security recommendations and propose ways to address the risk either by accepting it, transferring it, mitigating it, or eliminating it. Include your SAR in your final deliverable to leadership. Step 6: Develop the Presentation Based on what you have learned in the previous steps and your SAR, you will also develop a presentation for your company's leadership. Your upper-level management team is not interested in the technical report you generated from your Workspace exercise. Team members are more interested in the bottom line. You must help these nontechnical leaders understand the very technical vulnerabilities you have discovered. They need to clearly see what actions they must either take or approve. The following are a few questions to consider when creating your nontechnical presentation: • • How do you present your technical findings succinctly to a nontechnical audience? Your Workspace exercise report will span many pages, but you will probably not have more than 30 minutes for your presentation and follow-up discussion. How do you describe the most serious risks factually but without sounding too dramatic? No one likes to hear that the entire network has been hacked, data has been stolen, and the • • attackers have won. You will need to describe the seriousness of your findings while also assuring upper-level management that these are not uncommon occurrences today. How do your Workspace exercise results affect business operations? Make sure you are presenting these very technical results in business terms that upper-level management will understand. Be clear about what action you are recommending. Upper-level managers will want to understand not only what you discovered, but also what you propose as a solution. They will want to know what decisions they need to make based on your findings. Your goal for the presentation is to convince the leadership that the company needs to adopt at least one security vulnerability assessment tool to provide an extra layer of security.
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

View attached explanation and answer. Let me know if you have any questions.

Name:
Institution:
Outline on Security Assessment Report (SAR)
1. 1st Paragraph


Introduction

2. 2nd Paragraph


Operating System Vulnerabilities

3. 3rd to 8th Paragraphs


Vulnerability Scan

4. 9th to 14th Paragraph


OpenVAS
a) Advantages
i.

Open source and cost

ii.

Custom configuration

iii.

CVE coverage

iv.

Useful for any business

b) Disadvantages
5. 15th to 21st Paragraphs


Vulnerability Assessment Scan Data
a) Task 1
i.

TCP Timestamps

ii.

Telnet Unencrypted Cleartext Login

iii.

SSL/TLS

iv.

SSH weak encryption algorithms supported

b) Task 2
i.

DCE/RPC and MSRPC Services Enumeration Reporting

6. 22nd Paragraph


Conclusion


Student Name:

Institution Affiliation:
Course Name and Number:
Due Date:

▪ The vulnerability assessment scan used was (OpenVAS).

▪ The scan was conducted on two IP addresses;

192.168.10.2

192.168.10.4

▪ Task one results yielded 4 weaknesses.

▪ Task Two yielded only one weakness.

TCP Timestamps
▪ OpenVAS showed a medium severity level.

▪ TCP was designed to assist the organization overcome the challenges of unreliable

communication.

▪ A primary business operation is communication.

▪ The TCP timestamp allow endpoints to provide a measurement of RTT.

▪ The recommended solution will be to disable timestamps though mitigation.

Telnet Unencrypted Cleartext Login
▪ The usage of Telnet in unencrypted channel us unrecommended.
▪ The organization has been using unencrypted channel for logins and passwords.
▪ This weakness therefore allows attackers to eavesdrop on a session thus obtain sensitive

information (Sovine, 2021).
▪ The scan showed that the vulnerability had a medium severity level of 4.8.
▪ To address this problem the organization needs to replace Telnet with SSH protocol.
▪ The objective is to replace Telnet with a solution that supports encrypted connection.

SSL/TLS
▪ This is the third weakness n the first scan.

▪ The weakness involve activity of reporting weak cipher suites

▪ The organization operating systems need to be able to disable weaker SSL cipher suites.

▪ There is a need to enable stronger and secure SSL cipher suites

▪ Solution will therefore be to redesign the operating systems to accept weaker SSL cipher suites

SSH weak encryption algorithms supported
▪ The SSH server is configured to support weak encryption algorithms.

▪ The organization therefore has to disable the use of Arcfour algorithms (Hansen, 2020).

▪ An Nmap command can be used to validate the presence of weaker SSH cipher suites.

▪ The remediation for this vulnerability is for the organization to configure SSH servers.

▪ By configuring SSH servers the organization will disable CBC and Arcfour ciphers.

DCE/RPC and MSRPC Services Enumeration Reporting
▪ The second task was conducted on the second IP address 192.168.10.4

▪ The scan showed a medium severity level of 5.

▪ This weakness allows the attacker to access information from a remote host.

▪ The organization can address this weakness by filtering the incoming traffic.

▪ The five vulnerabilities found after the scans do not show any tasks of high severity.

▪ All the severity had a score that ranged between 2.6 and 5.0

▪ This means that the organization isn’t facing an urgent threat.

▪ However, the vulnerabilities need to be addressed.

▪ The overall recommended action for the organization is to mitigate these vulnerabilities

(Hacker target, n, d).

▪ Operating systems are bound to have weaknesses.

▪ The organization need to apply effective vulnerability assessment tools such as OpenVAS.

▪ The OpenVAS is free thus save on cost for the organization.

▪ The tool offers CVE Coverage (Hacking loops, n, d).

▪ The organization is therefore provided with mitigation strategies for the vulnerabilities.

...


Anonymous
Excellent resource! Really helped me get the gist of things.

Studypool
4.7
Indeed
4.5
Sitejabber
4.4

Similar Content

Related Tags