Threat, Vulnerability and Exploits Assessment

User Generated

enraxrl

Business Finance

Description

There are multiple ways to bring threats and vulnerabilities to light. Common practices and lessons learned can help us explore for known or common threats, but how does an organization with a unique or highly unusual setup discover its vulnerabilities? Many organizations turn to ethical hackers.
Write a four to five (4-5) page paper in which you:

  1. Describe common tools and techniques for identifying and analyzing threats and vulnerabilities.
  2. Critique the practice of offering rewards for discovering vulnerabilities.
  3. Explain the risks of challenging individuals to exploit vulnerabilities in your systems.
  4. Give your opinion on the formation of ethical hackers.
  5. Use at least two (2) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Please find the attached file. I look forward to working with you again. Good bye

Running head: THREATS AND VULNERABILITIES

THREATS AND VULNERABILITIES
Name
Professor
Course
Date of submission

1

THREATS AND Vulnerabilities

2

Tools and Techniques for Identifying and Analyzing Threats and Vulnerabilities
A vulnerability can be defined as a delicate plate in a computer system that holds the
potential of being misused by a security risk. Threats, on the other hand, can be described as the
expected results and impacts of vulnerabilities that are left unaddressed. As such, it is crucial to
regularly update the computer Windows on your Web server so as to avoid helplessness
programming. A considerable number of potential dangers is associated with such helplessness.
These include; incorporate loss of data, time of site downtime and the employees’ time which is
required to service a server upon being traded off.
Threats directed to the system may be positioned either outside or inside the system and
they come in diverse varieties. Usually, the aggressors are not aware who they could be
assaulting. However, there exist several examples of systems or organizations that are mainly
focused on. Utilizing the various techniques used in bargaining PCs and systems will offer an
essential viewpoint to continue. There exists a broad scope of tools used in checking the present
security condition of any system. These tools check for open ports, unpatched programming and
other problems that could be inhibiting the normal working condition of the system. Some of the
tools focus on a particular section, while others have the ability to examine the entire system.
Microsoft offers such a device called the Microsoft Baseline Security Analyzer. It is used in
checking for updates and constant design blunders for Microsoft items.
Another common technique or tool commonly used is the map which is usually offered
without any cost. Additionally, Nmap and other powerlessness filtering tools are also used. In
this technique, one sets up a full rundown of the possible expected vulnerabilities. One has to be
very keen and ensure that they have taken extraordinary considerations in identifying and
recognizing anything that might appear obscure in the system. For example, a library that is

THREATS AND Vulnerabilities

3

accessing the network security for the first time may think that they have a firewall while in the
real sense they have a switch provided by their ISP.
Critique Vulnerabilities Rewarding and Discovering
An honest-to-goodness advertising shows that the buyers who are particular
programming engineers are not usually within the security organizations and they take
inappropriate practices in identifying the vulnerabilities. Several global government agencies
have also been noticed purchasing people who determine the vulnerabilities and have been seen
to conceal their approaches.
Moreover, compensating security experts and other individuals who play a crucial role in
ensuring that the programming items are much secure is considerably essential. Rewarding
people who identify programming problems or hitches before they are misused by dark cap
exploiters is key to maintaining system security.
In the present time, there are very few helplessness reward programs with most of them
being made just a few years ago. As such, the idea of reward programs though is still very fresh
requires more improvement and transformation. Although the motivation for helplessness
pioneers has been previousl...


Anonymous
I was stuck on this subject and a friend recommended Studypool. I'm so glad I checked it out!

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags