week 4 vulnerability

User Generated

vfuzbgb1

Computer Science

Description

Here's a link to your week 4 assignment details: Identifying Risks, Threats, and Vulnerabilities in an IT Infrastructure Using Zenmap GUI (Nmap) and Nessus Reports

Click here to access your lab files: Nessus and Nmap

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached is the answer for your question

Running head: INFOMRATION SECURITY AND VULNERABILITY

LAB REPORT AND ACCESS
Name of student
Name of tutor
Course
Date

1

LAB REPORT

2

Review
Computers are well-known equipment all over the world. There are thousands or even
millions of computer genius out there. There are millions of programs and data that are available
on the computers. Apart from that, there is always a risk, threats, and vulnerabilities that are part
of the limitations. However, there are programs like Zenmap® GUI (Nmap) network, Nessus®
software, and port scans. In the vulnerability scanners on risk in information, different reports
were recorded after the lab report was finalized. There were various threats and risk that was
found.
Zenmap® GUI (Nmap) network is a network that aid in discovering of dynamic hosts by
use of a combination o...


Anonymous
Great! Studypool always delivers quality work.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags