Business > CASE STUDY > Executive_Summary.docx Executive Summary ISSC 363 Executive Summary A network analys (All)

Executive_Summary.docx Executive Summary ISSC 363 Executive Summary A network analys

Document Content and Description Below

Executive_Summary.docx Executive Summary ISSC 363 Executive Summary A network analysis condycted was used to generate two reports, the Zenmap® GUI (Nmap) report and Nessus® reports. In the... Nmap, an open Cisco Adaptive Security appliance device Port, port 22 was identified. The IP address of this device is 172.30.0.1. Further, the Nessus Vulnerability Scan Report indicated that IP hosts 172.16.20.1, 172.17.20.1, 172.18.20.1, 172.19.20.1, 172.20.20.1, 172.30.0.10 and 172.30.0.66 were vulnerable. The vulnerabilities of these IP addresses varied from low severity to high severity. Addresses 172.16.20.1 and 172.19.20.1 ranked as low severity. However, the remaining addresses were identified as highly severe. This means that the vulnerability across these addresses is a major problem for the organization and as such, it is imperative that countermeasures are identified and used to protect the system before these vulnerabilities are exploited. The exploitation of the open port and these vulnerable IP addresses could be devastating to the organization. Studies have indicated that open ports can easily be accessed by attackers as way of attacking he network. Open ports and vulnerable IP addresses are subject to malware attacks, something that the company needs to be proactive against. Port 22 is made an easy target by weak passwords. To eliminate this risk, the company should ensure staff members dont use default or credentials that are easy to guess (Geer, 2017). Passwords should be made comple. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . .. .. . . . . . . . . . . . . . . . . . .. . . . . [Show More]

Last updated: 1 year ago

Preview 1 out of 3 pages

Add to cart

Instant download

We Accept:

We Accept
document-preview

Buy this document to get the full access instantly

Instant Download Access after purchase

Add to cart

Instant download

We Accept:

We Accept

Reviews( 0 )

$10.00

Add to cart

We Accept:

We Accept

Instant download

Can't find what you want? Try our AI powered Search

OR

REQUEST DOCUMENT
23
0

Document information


Connected school, study & course


About the document


Uploaded On

Jul 31, 2022

Number of pages

3

Written in

Seller


seller-icon
helperatsof1

Member since 3 years

48 Documents Sold


Additional information

This document has been written for:

Uploaded

Jul 31, 2022

Downloads

 0

Views

 23

Document Keyword Tags

Recommended For You

Get more on CASE STUDY »

$10.00
What is Browsegrades

In Browsegrades, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.

We are here to help

We're available through e-mail, Twitter, Facebook, and live chat.
 FAQ
 Questions? Leave a message!

Follow us on
 Twitter

Copyright © Browsegrades · High quality services·