Tuesday, August 27, 2019
Vulnerability Tools Essay Example | Topics and Well Written Essays - 2500 words
Vulnerability Tools - Essay Example nformation systems. Nessus is a comprehensive and open source security scanner. Plug-in architecture allows users to customize it as per their systems and networks. The security scanner frequently updates itself and provides full reporting, host scanning, and real-time vulnerability searches. Security audit features of Nessus are (Messmer, 2005): Credentialed and un-credentialed port scanning Network based vulnerability scanning Credentialed based patch audits for Windows and most Unix platforms Credentialed configuration auditing of most Windows, Unix platforms Robust and comprehensive credentialed security testing of 3rd party applications such as iTunes, JAVA, Skype and Firefox Custom and embedded web application vulnerability testing SQL database configuration auditing Cisco Router configuration auditing Software enumeration on Unix and Windows Testing anti-virus installs for out-of date signatures and configuration errors Another popular and open source tool for vulnerability an alysis is Wireshark. This tool, which was previously named as Ethereal, also provides functionality for packet sniffing. A relatively easy GUI along with various filtering and sorting options makes this tool perfect for non-savvy IT staff within organizations (Scalisi, 2010). Comparing Nessus and Wireshark Wireshark is considered to be at top of the list for network protocol analyzers. Wireshark not only provides vulnerability analysis, as its functionality can be resembled with ââ¬Å"tcpdump.â⬠It emphasizes protocols and represents data streams on the GUI. The major advantage that this tool has is the compatibility of operating systems, as it supports OS X, Windows, UNIX and Linux. Moreover, it also extensively supports Voice over IP that is a significant option for the organization, as international and corporate organizations use VoIP for communication purposes to save cost and at the same time deliver quality. Nessus, on the other hand, is used in more than 75,000 organiz ations around the globe and it is considered to be one of the worldââ¬â¢s most popular vulnerability scanner (Ferguson, n.d.). However, the third version, i.e. version 3, has now been converted to a proprietary license as the scanning engine is still free and updates are also available after a week on a release. Relating with the Scenarios When Nessus is incorporated in a large enterprise, most probably, a government organization such as Department of Defense (DOD) networks, it will initiate a port scan and target the defined host or a network. After opening the port, it examines all the services that are running on the system or network and tests all the detected services against vulnerabilities defined in the Nessus vulnerability database (Kim, n.d.). As this tool can develop a testing platform for network resilience, the report generation is very comprehensive that is ideal for large enterprises. As it is an easy remote based vulnerability analysis tool, it can be best suited for large enterprises that are geographically dispersed in more than one continent
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.