Step 1: Define the OS
The audience for your security assessment report (SAR) is the leadership of your company, which is
made up of technical and nontechnical staff. Some of your audience will be unfamiliar with operating
systems. Therefore, you will begin your report with a brief explanation of OS fundamentals and the
types of information systems.
Click to read the following resources that provide information you need to know before writing a
thorough and accurate OS explanation:
•
•
•
•
operating systems fundamentals
information system architecture
cloud computing
web architecture
After reviewing those resources, begin drafting the OS overview to do the following:
1. Explain the user's role in an OS.
2. Explain the differences between kernel applications of the OS and the applications installed
by an organization or user.
3. Describe the embedded OS.
4. Describe how the systems fit in the overall information system architecture, of which cloud
computing is an emerging, distributed computing network architecture.
Include a brief definition of operating systems and information systems in your SAR.
Step 2: Review OS Vulnerabilities
You just summarized operating systems and information systems for leadership. In your mind, you
can already hear leadership saying, "So what?" The company's leaders are not well versed in
operating systems or in the threats and vulnerabilities in them, so you decide to include in your SAR
an explanation of advantages and disadvantages of the different operating systems and their known
vulnerabilities.
Prepare by first reviewing the different types of vulnerabilities and intrusions explained in these
resources:
•
•
•
•
Windows vulnerabilities
Linux vulnerabilities
Mac OS vulnerabilities
SQL PL/SQL, XML, and other injections
Based on what you gathered from the resources, compose the OS vulnerability section of the
SAR. Be sure to:
•
•
explain Windows vulnerabilities and Linux vulnerabilities.
explain the Mac OS vulnerabilities, and vulnerabilities of mobile devices.
•
•
•
•
explain the motives and methods for intrusion of the MS and Linux operating systems.
explain the types of security awareness technologies, such as intrusion detection and
intrusion prevention systems.
describe how and why different corporate and government systems are targets; and
describe different types of intrusions such as SQL PL/SQL, XML, and other injections.
You will provide the company's leadership with a brief overview of these vulnerabilities in your SAR.
Step 3: Prepare for the Vulnerability Scan
You have just finished defining the vulnerabilities an OS can have. Soon, you will perform
vulnerability scanning and vulnerability assessments on the security posture of your company's
operating systems. But first, consider your plan of action. Read these two resources to be sure you
fully grasp the purpose, goals, objectives, and execution of vulnerability assessments and security
updates:
•
•
Vulnerability Assessments
Patches
Then provide the leadership with the following:
•
•
•
A description of the methodology you propose to assess the vulnerabilities of the operating
systems, including an explanation of how this methodology will determine the existence of
those vulnerabilities in your company's OS
A description of the applicable tools to be used and any limitations of the tools and analyses,
including an explanation of how your proposed applicable tools will determine the existence
of those vulnerabilities in your company's OS
The projected findings from using these vulnerability assessment tools
In your report, discuss the strength of passwords, any Internet Information Services' administrative
vulnerabilities, SQL server administrative vulnerabilities, and other security updates and
management of patches, as they relate to OS vulnerabilities.
Step 4: Review Vulnerability Assessment Tools for OS and Applications
Vulnerability assessment is scanning a network for known security weaknesses. Vulnerability scanners
are software tools designed to provide an automated method for conducting vulnerability scans across
an entire network that may run into hundreds or even thousands of machines. According to EC-Council
(2018), vulnerability scanners can help identify the following types of weaknesses:
•
•
•
•
•
•
the OS version running on computers or devices
IP and Transmission Control Protocol/User Datagram Protocol (TCP/UDP) ports that are
listening
applications installed on computers
accounts with weak passwords
files and folders with weak permissions
default services and applications that might have to be uninstalled
•
•
mistakes in the security configuration of common applications
computers exposed to known or publicly reported vulnerabilities
Additionally, vulnerability scanners can be used to help predict the effectiveness of countermeasures
(security controls) and to test the effectiveness of those controls in the production network. Further,
vulnerability scanners also have limitations, primarily in that they are only as effective as the supporting
databases and/or plug-ins at a point in time. Large, automated vulnerability scanning suites also require
maintenance, tuning, and frequent updates to be able to detect new vulnerabilities. Finally, scanning
engines are prone to both false positives and negatives. That is where you as the cybersecurity
professional will apply your deep knowledge of the environment, network, and applications in use.
Two common vulnerability scanners used in industry are the free Open-Source scanner OpenVAS, and
the commercial tool, Nessus. In this lab, you will use OpenVAS. Select the following links to learn more
about OpenVAS and computer networks:
•
•
OpenVAS
Computer Networks
Your leadership will want to understand the capabilities of the OpenVAS scanner, so you will need to
include that information in your Security Assessment Report (SAR).
Use the tool’s built-in checks to complete the lab. For details on accessing the lab, see the "Complete
This Lab" box below.
Use OpenVAS to complete the following:
For the Windows OS:
1.
2.
3.
4.
Determine if Windows administrative vulnerabilities are present.
Determine if weak passwords are being used on Windows accounts.
Report which security updates are required on each individual system.
The tool provides a dynamic assessment of missing security updates. Scan one or more
computers by domain, IP address range, or other groupings.
5. Once complete, provide a detailed report and recommendations on how to make your system a
more secure working environment. In this case, the OpenVAS tool will create and store
individual XML security reports for each computer scanned and will display the reports in the
graphical user interface in HTML.
For the Linux OS:
1.
2.
3.
4.
Determine if Linux vulnerabilities are present.
Determine if weak passwords are being used on Linux systems.
Determine which security updates are required for the Linux systems.
The tool provides a dynamic assessment of missing security updates. Scan one or more
computers by domain, IP address range, or other groupings.
5. Once complete, provide a detailed report and recommendations on how to make your system a
more secure working environment.
Knowledge acquired from this Workspace exercise will help your company's client organizations secure
the computer networks' resources and protect corporate data from being stolen.
Validate and record the benefits of using these types of tools. You will include this in the SAR.
References
EC-Council (2018). Certified Ethical Hacker (CEH) Version 10 eBook (Volumes 1 through 4). [VitalSource
Bookshelf]. Retrieved from https://bookshelf.vitalsource.com/#/books/9781635671919
Step 5: Create the Security Assessment Report
By using the OpenVAS security vulnerability assessment tool from the previous step, you now have a
better understanding of your system's security status. Use the results you obtained to create the
Security Assessment Report (SAR) as part of your deliverables.
In your report to the leadership, make sure to emphasize the benefits of using the security tool, and
provide recommendations based on your findings.
Remember to include analyses and conclusions in the SAR deliverable as follows:
1. After you provide a description of the methodology you used to make your security
assessment, provide the actual data from the tools, the status of security and patch updates,
security recommendations, and specific remediation guidance for your senior leadership.
2. Include any risk assessments associated with the security recommendations and propose
ways to address the risk either by accepting it, transferring it, mitigating it, or eliminating it.
Include your SAR in your final deliverable to leadership.
Step 6: Develop the Presentation
Based on what you have learned in the previous steps and your SAR, you will also develop a
presentation for your company's leadership.
Your upper-level management team is not interested in the technical report you generated from
your Workspace exercise. Team members are more interested in the bottom line. You must help
these nontechnical leaders understand the very technical vulnerabilities you have discovered. They
need to clearly see what actions they must either take or approve. The following are a few questions
to consider when creating your nontechnical presentation:
•
•
How do you present your technical findings succinctly to a nontechnical audience? Your
Workspace exercise report will span many pages, but you will probably not have more than
30 minutes for your presentation and follow-up discussion.
How do you describe the most serious risks factually but without sounding too dramatic? No
one likes to hear that the entire network has been hacked, data has been stolen, and the
•
•
attackers have won. You will need to describe the seriousness of your findings while also
assuring upper-level management that these are not uncommon occurrences today.
How do your Workspace exercise results affect business operations? Make sure you are
presenting these very technical results in business terms that upper-level management will
understand.
Be clear about what action you are recommending. Upper-level managers will want to
understand not only what you discovered, but also what you propose as a solution. They will
want to know what decisions they need to make based on your findings.
Your goal for the presentation is to convince the leadership that the company needs to adopt at least
one security vulnerability assessment tool to provide an extra layer of security.
Purchase answer to see full
attachment