Identify Vulnerabilities in IT Security

Scenario

Marymount University has been the target of focused attacks from a
variety of attackers. Your manager, Professor Boyce has assigned you the
task to review the port and vulnerability scan data recently gathered
from a typical system to determine what ports and services are exposed
to attackers, and what vulnerabilities exist on that system.

Required Resources

Access to the Internet

Text sheet: Zenmap Intense Scan Results Preview the document

Tasks

1. Analyze the results of the Zenmap scan. Your report must answer the following questions:

What are the first five open ports as identified by the Zenmap scan?

Include the port number

Include the service name

nclude a brief description of how each is used

2. The Nessus scan identified two critical vulnerabilities, identified as ID 32314 and ID 33850.

Research the vulnerabilities against the Common Vulnerabilities and Exposure (CVE) database.

Include the name and a brief description of each vulnerability.

3. Determine what can be done to protect the system and defend the
campus network against attempts to gather data, and to resolve
vulnerabilities. Also determine which ports and services likely need to
remain open.

4. Write a report targeted at IT management and systems
administration staff explaining the vulnerabilities and protection
mechanisms that Aim Higher College should adopt, which will be applied
to all similar systems at the college.

Submission Requirements

Format: Microsoft Word (or compatible)

Font: Times New Roam, size 12, double-space

Citation Style: APA

Length: 2 to 4 pages

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now