Access over 20 million homework & study documents

search

Vm Scanner Background Report

Content type
User Generated
Subject
Computer Science
Type
Homework
Rating
Showing Page:
1/8
1
VM Scanner Background Report
Melody Goliday
CMIT 421-6980 Threat Management and Vulnerability
03/31/21

Sign up to view the full document!

lock_open Sign Up
Showing Page:
2/8
2
Introduction
Most organizations focus on ensuring that they are safe through the use of different
software to scan and understand the problems they are facing. Therefore, organizations are
focusing on carrying out vulnerability scanning that is important in ensuring that the
organizations know the vulnerabilities within their departments. However, vulnerability scanning
has been recommended weekly to ensure that all the regions in the organizational network are
covered (Coffey et al., 2018). Scanners have wide usage and can be used throughout an
organization network to strengthen the network and set up the working environment. There are
different vulnerability scanning tools that an organization can implement, such as Nikto2, Nmap,
OpenSCAP, Arachni, among others (Upadhyay et al., 2020). Apart from the mentioned
vulnerability scanners, the Nessus vulnerability scanner is noted to be more advanced and faster
in examining the security in an organization (Coffey et al., 2018). The essay will focus on the
VM Scanner background report according to Nessus vulnerability scanning in the organization.
In particular, the report will evaluate whether the Nessus vulnerability scanner is an appropriate
and effective solution to eliminating the vulnerabilities present in Mercury USA’s systems.
Part 1: Nessus Vulnerability Report Analysis
With the different vulnerability scanners that an organization can use to carry out
scanning, the most preferred one is the Nessus vulnerability scanner (Upadhyay et al., 2020). It is
noted to be a de-facto industry standard vulnerability assessment tool that security practitioners
apply in an organization. It is noted to be intelligent, has rapid updates, and has an easy-to-use
interface that any security practitioner can use in an organization (Upadhyay et al., 2020). In
addition, the tool is cost-effective. Any company can use it, it has various detection means, and
the different plugins are known for providing timely protection in an organization.

Sign up to view the full document!

lock_open Sign Up
Showing Page:
3/8

Sign up to view the full document!

lock_open Sign Up
End of Preview - Want to read all 8 pages?
Access Now
Unformatted Attachment Preview
1 VM Scanner Background Report Melody Goliday CMIT 421-6980 Threat Management and Vulnerability 03/31/21 2 Introduction Most organizations focus on ensuring that they are safe through the use of different software to scan and understand the problems they are facing. Therefore, organizations are focusing on carrying out vulnerability scanning that is important in ensuring that the organizations know the vulnerabilities within their departments. However, vulnerability scanning has been recommended weekly to ensure that all the regions in the organizational network are covered (Coffey et al., 2018). Scanners have wide usage and can be used throughout an organization network to strengthen the network and set up the working environment. There are different vulnerability scanning tools that an organization can implement, such as Nikto2, Nmap, OpenSCAP, Arachni, among others (Upadhyay et al., 2020). Apart from the mentioned vulnerability scanners, the Nessus vulnerability scanner is noted to be more advanced and faster in examining the security in an organization (Coffey et al., 2018). The essay will focus on the VM Scanner background report according to Nessus vulnerability scanning in the organization. In particular, the report will evaluate whether the Nessus vulnerability scanner is an appropriate and effective solution to eliminating the vulnerabilities present in Mercury USA’s systems. Part 1: Nessus Vulnerability Report Analysis With the different vulnerability scanners ...
Purchase document to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Anonymous
Really useful study material!

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4