This website uses cookies to ensure you have the best experience. Learn more

Vulnerability Essay

2025 words - 9 pages

No matter how secure one believes a network to be the need to conduct vulnerability assessments is of the upmost importance if a company or organization has information that is confidential or vital in nature. The need to conduct penetration testing should be an ongoing task for organizations as new technologies emerge. Even with security measures in place hackers continue to find ways around the roadblocks which are put in place to secure our networks. Just this month alone the Federal Bureau of Investigation’s network was compromised as a hacker was able to penetrate the emails of one of the organization’s special agents (Brito, 2012). The FBI has some of the most sophisticated ...view middle of the document...

The idea on conducting a penetration testing is not to be taken lightly. The software used to conduct security assessments can range from a few hundred dollars to well over $30,000 (Sawyer, 2009). If a company is going to invest this type of finances into a software they will want to know that the product is in fact going to benefit their organization. It is likely that the request for penetration testing is going to bring forth many questions from an organization regarding the need to conduct such testing. They will want to know what the cost will be for such software, if current staff is skilled enough to conduct the testing and if the testing will interrupt current duties. For the purpose of this paper we will assume that the IT employee is adequate to operate and conduct testing.
Once the company determines that their IT staff is competent to operate the software the next step will be to acquire the actual software. There are a multitude of packages and software that could be used to conduct penetration testing. We will examine three penetration tools and discuss the benefits and weakness in using the software to assess one’s network for security vulnerabilities to determine whether a company or organization should in fact invest in such software.
The first penetration tool that we will discuss is Core Impact. This is an excellent penetration testing source however, the software is rather pricey with a price tag of $30,000 plus (Business Case / Purchase Justification for CORE IMPACT Pro, p. 6). Core Impact Pro is a software that can be used to internally test the security of network systems, endpoints, web applications, wireless networks, as well as testing of phishing and other emails social engineering attacks (Core Impact). One of the great benefits of Core Impact is that the software continues to upgrade as new technologies and issues emerge. A third benefit of Core Impact Pro is that the software’s method of scanning a network for vulnerabilities uses the same algorithms and methods that hackers use thus providing a scan that is simulated to as close to a real life hack as one can get without actually involving a live hacker. This software will assists IT staff in pinpointing the most vulnerable areas on a network. The Core impact software also has an automated penetration process which can; “gather information, attack/penetrate, gather local information, escalate issues based on privilege, cleanup and generate reports on findings” (Core Impact). Laypersons or IT staff who are not as familiar with the hacking world find that Core Impact’s graphical user interface (GUI) to be especially helpful as the users can use the GUI to view penetration exploits and vulnerabilities with ease.
Let’s examine how Core impact works. This software “launches agents (programs installed on compromised systems) and modules which are operations launched against target systems and consoles (operations include port scanning, os...

Other Papers Like Vulnerability

The Vulnerability Of Computerised Accounting Information Systems To Computer Crime

2560 words - 11 pages Abstract.The objective of this essay is to determine the vulnerability of computerised accounting information system to computer crime and the solutions to prevent such crime from occurring in organisations. Ever-Changing information technology has made computerised accounting processes easier. However, it has also created significant threats in relation to ensuring the security and reliability of computerised accounting information systems

Window Of Vulnerability Essay

290 words - 2 pages Richman Investments Richman Investment To: Senior Manager  From: Intern Jermel Corbett My Senior manager asked me to pre-pair a brief report concerning the Internal Use only Data and classification standards of Richman Investments IT infrastructure domain. The information obtained   in the report consists of a study done on all seven layers of the IT infrastructure. At the conclusion of this study I will establish that three of the

The Vulnerability Of Innocent Characters In Steinbeck's Of Mice And Men

656 words - 3 pages The harsh reality is one which hit everyone in America in the 1930. People found work hard to find and crime was on the uprise. This meant, unfortunately, that innocent people were the easy prey and, as we see in the Of Mice and Men, there were plenty of characters that were easy prey. Of Mice and Men characters have and do thing that make them vulnerable in way which do cause trouble. In this essay, that harsh reality and easy prey will be shown


307 words - 2 pages Lab #2 – Assessment Worksheet Performing a Vulnerability Assessment Course Name and Number: _____________________________________________________ Student Name: ________________________________________________________________ Instructor Name: ______________________________________________________________ Lab Due Date: ________________________________________________________________ Overview In this lab, you used Nmap commands within the Zenmap

Is3110T Lab 2 Assessment Worksheet

954 words - 4 pages Lab #2 Assessment Worksheet Align Risks, Threats, & Vulnerabilities to COBIT P09 Risk Management Controls 1. a. Unauthorized access from public internet - HIGH b. User destroys data in application and deletes all files - LOW c. Workstation OS has a known software vulnerability – HIGH d. Communication circuit outages - MEDIUM e. User inserts CD’s and USB hard drives with personal photos, music and videos on organization

Mr Security

3463 words - 14 pages VULNERABILITY ASSESSMENT WHITEPAPER Automating Vulnerability Assessment This paper describes how enterprises can more effectively assess and manage network vulnerabilities and reduce costs related to meeting regulatory requirements. Automated Vulnerability Assessment / Vulnerability Management (VA/VM) solutions are supplementing and in some cases replacing manual penetration testing with an overall improvement in network security without


273 words - 2 pages mitigation tactics that can be used in order to audit for compliance. They are the following: • Enable password protection on workstations for access. Enable auto screen lockout for inactive times. • Define strict access control policies, standards, procedures, and guidelines. Implement a second-level test to verify a user’s right to gain access. • Define workstation operating system vulnerability window policy definition. A vulnerability window is

Disaster Mapping

2742 words - 11 pages is often the coping capacity of those affected, improving their resilience when responding to disasters is a key approach to lessening the consequence of a disaster. A vulnerability map gives the precise location of sites where people, the natural environment or property are at risk due to a potentially catastrophic event that could result in death, injury, pollution or other destruction. Such maps are made in conjunction with information about

Fooling with Faith

587 words - 3 pages the best of them. One way of vulnerability is shown is by living a lie and being hypocritical like Manley pointer from “Good Country People”. He is a suppose to be a good Christian but ends up taking Joy’s Prostheses leg and he takes out a hollowed bible with condoms, a bottle of whiskey and sex cards. He is a masked evil man trying to portrayed a innocent Christian salesman. These things happen in today’s society in people don’t realize how

What Is Disaster

602 words - 3 pages of inappropriately managed risk. These risks are the product of hazards and vulnerability. Hazards that strike in areas with low vulnerability are not considered a disaster, as is the case in uninhabited regions.[1] Etymology The word derives from Middle French désastre and that from Old Italian disastro, which in turn comes from the Greek pejorative prefix δυσ-, (dus-) "bad"[3] + ἀστήρ (aster), "star".[4] The root of the word disaster ("bad


575 words - 3 pages vulnerability and it was established because Simms agreed to act on behalf of Hodgkinson, was in a position to affect his interests, and Hodgkinson relied on Simms. In addition, there was real or potential conflict of interest that was not disclosed to Hodgkinson. • At the Court of Appeal, it was found that were was no fiduciary duty because the required degree of vulnerability had not been proved, and that Hodgkinson knew the risks of

Related Essays

Vulnerability Assessment Scan Essay

572 words - 3 pages ------------------------------------------------- Lab Assignment for Chapter 3 Performing a Vulnerability Assessment Course Name and Number: Student Name: Student Number: Instructor Name: Onook Oh Submission Due by: 11:59PM on February 3rd, 2015 ------------------------------------------------- Overview To complete the Lab Assignment for Chapter 3, students should first carefully read the “Introduction” information in the lab

Vulnerability Assessment Penetration Analysis

972 words - 4 pages Vulnerability Assessment Penetration Analysis A. Memo For Record: IDS upgrade or replacement Summary of Events: The health care clinic’s network security appliance (combined router/firewall/wireless access point) was hacked and passwords were cracked. Configuration changes to this device opened the network to a Denial-of-Service (DoS) attack. The result of this attack prevented access to patient records and insurance claims as part

Hazard Vulnerability Assessment Essay

4036 words - 17 pages The Philadelphia Water Department, Baxter Water Treatment Plant Anthony Vega, Denise Youmans, Christopher Williams, Stephen Glenn, Darnell Jessie Immaculata University EPM 301 Report Summary The purpose of this assessment is designed to look at the hazard vulnerability and exploitation potential surrounding The Philadelphia Water Department, Baxter Water Treatment Plant located at 9001 State Road in Philadelphia, Pa. The treatment plant

The Aspects Of Vulnerability Among The Exploited In Medical Research

2287 words - 10 pages Essentially, everyone is in some state of vulnerability. However, some of us are more susceptible to harm due to our vulnerabilities. The susceptible are the individuals with the greatest risk. These individuals risk the loss of their autonomy, and maybe even their lives. Vulnerable populations can be found in every subset of society. However, as previously mentioned, there are some vulnerable populations that are at an even greater risk than