Nessus is a network security tool In a pragraph describe how it is useful to a networksecurityspecialist and how it may be used for harmfulpurposes by a hacker? Note: provide relaiblerefrences for your answer. Solution Nessus: Nessus is a proprietary vulnerability scanner.Nessus was developed by Tenable network security. How it is useful?: It is extremely good for discovering platform and network device vulnerabilities. •It is a good automated tool for finding Mis configuration,default passwords and known vulnerabilities on systems. •Denails of service against the TCP/IP stack by using malforme packets. •It also has some web scanning options that can be configured,different types of ports scanning. •Another useful Nessus opetion is the ability to enable(or) disable testing of embedded web servers that may be adversely affectd, when scanned. •Nessus provides the ability for the user to adjust how Nessus tests each CGI scrit and determine the duration of the tests. •Nessus also provides special features for Webmirroring. How it may be used harmful purposses?: If some one wanted to hack your local network,the first thing they do is run a vulnerability scan then they\'d run a penetration test. •A vulnerability scan digs through the various devices on your network and looks for potential holes,like open port,outdated software with known vulnerabilities.If they find any thing a hacker would exploit them. •Nessus is scan vulnerabilities and shoreup your home network. •Nessus vulnerability scanner is fast and diverse tool that helps any size organization audit their assets for security vulnerabilities. •security center can organize network assets into categories through a combination of network scanning,passive network monitoring and integration with existing asset and network management data tools. •Security Center can manage scans of software under development to defect vulnerabilities,early in the development cycle. •Nessus is used to check the understanding operating system for any vulnerabilities in the operating system application(or) database. •Nessus can be used to check the configuration of the os,application and database. •Nessus can performs a various of Web application audit to test for common aplication vulnerabilities. •Nessus provides special features for Web mirroring,allowing user to specify which part of the website will be crawled(or)not. •Nessus has ability to enable(or)disable testing of embedded web servers that may be adversely affected when scanned. •The pvs can monitor network traffic for encrypted data. •The LCE can be used to monitor any logs generated by software. •LCE can make use of Web and Databse to look for application process and testing..