Access over 20 million homework & study documents

Vm Scanner Background Report

Content type
User Generated
Subject
Information Technology
School
University of Maryland Global Campus
Type
Homework
Rating
Showing Page:
1/8
1
VM Scanner Background Report
<Student Name>
CMIT 421 <Section #xxxx> Threat Management and Vulnerability Assessment
<Date>

Sign up to view the full document!

lock_open Sign Up
Showing Page:
2/8
2
VM Scanner Background Report
Introduction
Undoubtingly, the mitigation of cyber-attacks is an important responsibility for the
modern-day organization. This ensures that the organization is well prepared for any attacks and
threats to its information systems. Vulnerability scanners are vital tools in mitigating cyber-
attacks as they help the organization monitor their networks, systems, and applications for any
security vulnerabilities. A vulnerability scan of Mercury USA revealed three system
vulnerabilities. The vulnerabilities had high threat levels (two) and a medium threat level. This
paper focuses on these vulnerabilities identified and how attackers might take advantage of the
reported vulnerabilities. There is also a recommendation to purchase licenses for Nessus to
become part of the organization's cybersecurity tools.
Part 1: Nessus Vulnerability Report Analysis
The first vulnerability identified as a threat to Mercury USA's operations is the lack of a
critical security update in their host machine. This is a security update published in Microsoft
Bulletin MS17-010 (Fujimoto et al., 2019). Organizations should install security updates to
ensure that they protect their systems from malicious attacks. They can also avoid vulnerabilities
identified in outdated programs (Fleischmann et al., 2016). If Mercury USA does not handle this
vulnerability, remote attackers can access the target machines in their organization. They will
also execute code that would be detrimental to the organization as the attackers can easily attack
their entire system by elevating their privilege. The second vulnerability identified is that the
host machine runs an operating system that has reached the end of life. Operating systems that
have reached the end of life are not subject to any updates and are at a high risk of cyber-attacks

Sign up to view the full document!

lock_open Sign Up
Showing Page:
3/8

Sign up to view the full document!

lock_open Sign Up
End of Preview - Want to read all 8 pages?
Access Now
Unformatted Attachment Preview
1 VM Scanner Background Report CMIT 421 Threat Management and Vulnerability Assessment 2 VM Scanner Background Report Introduction Undoubtingly, the mitigation of cyber-attacks is an important responsibility for the modern-day organization. This ensures that the organization is well prepared for any attacks and threats to its information systems. Vulnerability scanners are vital tools in mitigating cyberattacks as they help the organization monitor their networks, systems, and applications for any security vulnerabilities. A vulnerability scan of Mercury USA revealed three system vulnerabilities. The vulnerabilities had high threat levels (two) and a medium threat level. This paper focuses on these vulnerabilities identified and how attackers might take advantage of the reported vulnerabilities. There is also a recommendation to purchase licenses for Nessus to become part of the organization's cybersecurity tools. Part 1: Nessus Vulnerability Report Analysis The first vulnerability identified as a threat to Mercury USA's operations is the lack of a critical security update in their host machine. This is a security update published in Microsoft Bulletin MS17-010 (Fujimoto et al., 2019). Organizations should install security updates to ensure that they protect their systems from malicious attacks. They can also avoid vulnerabilities identified in outdated programs (Fleischmann et al., 2016). If Mercury USA does not handle this vulnerabi ...
Purchase document to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Anonymous
Very useful material for studying!

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4