SlideShare a Scribd company logo
1 of 2
Download to read offline
Nessus is a network security tool
In a pragraph describe how it is useful to a networksecurityspecialist and how it may be used for
harmfulpurposes by a hacker?
Note: provide relaiblerefrences for your answer.
Solution
Nessus:
Nessus is a proprietary vulnerability scanner.Nessus was developed by Tenable network security.
How it is useful?:
It is extremely good for discovering platform and network device vulnerabilities.
•It is a good automated tool for finding Mis configuration,default passwords and known
vulnerabilities on systems.
•Denails of service against the TCP/IP stack by using malforme packets.
•It also has some web scanning options that can be configured,different types of ports scanning.
•Another useful Nessus opetion is the ability to enable(or) disable testing of embedded web
servers that may be adversely affectd, when scanned.
•Nessus provides the ability for the user to adjust how Nessus tests each CGI scrit and determine
the duration of the tests.
•Nessus also provides special features for Webmirroring.
How it may be used harmful purposses?:
If some one wanted to hack your local network,the first thing they do is run a vulnerability scan
then they'd run a penetration test.
•A vulnerability scan digs through the various devices on your network and looks for potential
holes,like open port,outdated software with known vulnerabilities.If they find any thing a hacker
would exploit them.
•Nessus is scan vulnerabilities and shoreup your home network.
•Nessus vulnerability scanner is fast and diverse tool that helps any size organization audit their
assets for security vulnerabilities.
•security center can organize network assets into categories through a combination of network
scanning,passive network monitoring and integration with existing asset and network
management data tools.
•Security Center can manage scans of software under development to defect vulnerabilities,early
in the development cycle.
•Nessus is used to check the understanding operating system for any vulnerabilities in the
operating system application(or) database.
•Nessus can be used to check the configuration of the os,application and database.
•Nessus can performs a various of Web application audit to test for common aplication
vulnerabilities.
•Nessus provides special features for Web mirroring,allowing user to specify which part of the
website will be crawled(or)not.
•Nessus has ability to enable(or)disable testing of embedded web servers that may be adversely
affected when scanned.
•The pvs can monitor network traffic for encrypted data.
•The LCE can be used to monitor any logs generated by software.
•LCE can make use of Web and Databse to look for application process and testing.

More Related Content

Similar to Nessus is a network security toolIn a pragraph describe how it is .pdf

Finalppt metasploit
Finalppt metasploitFinalppt metasploit
Finalppt metasploitdevilback
 
website vulnerability scanner and reporter research paper
website vulnerability scanner and reporter research paperwebsite vulnerability scanner and reporter research paper
website vulnerability scanner and reporter research paperBhagyashri Chalakh
 
Cyber-Security-Unit-4.pptx
Cyber-Security-Unit-4.pptxCyber-Security-Unit-4.pptx
Cyber-Security-Unit-4.pptxTikdiPatel
 
Vulnerability assessment and penetration testing
Vulnerability assessment and penetration testingVulnerability assessment and penetration testing
Vulnerability assessment and penetration testingAbu Sadat Mohammed Yasin
 
Nessus is a network security tool- write a pragraph describe itsto.pdf
Nessus is a network security tool- write a pragraph describe itsto.pdfNessus is a network security tool- write a pragraph describe itsto.pdf
Nessus is a network security tool- write a pragraph describe itsto.pdffazilfootsteps
 
OpenVAS
OpenVASOpenVAS
OpenVASsvm
 
INSECT | Security System Project | 2011
INSECT | Security System Project | 2011INSECT | Security System Project | 2011
INSECT | Security System Project | 2011Rainer Arencibia
 
Cryptography and system security
Cryptography and system securityCryptography and system security
Cryptography and system securityGary Mendonca
 
Practical White Hat Hacker Training - Vulnerability Detection
Practical White Hat Hacker Training - Vulnerability DetectionPractical White Hat Hacker Training - Vulnerability Detection
Practical White Hat Hacker Training - Vulnerability DetectionPRISMA CSI
 
"Automated Malware Analysis" de Gabriel Negreira Barbosa, Malware Research an...
"Automated Malware Analysis" de Gabriel Negreira Barbosa, Malware Research an..."Automated Malware Analysis" de Gabriel Negreira Barbosa, Malware Research an...
"Automated Malware Analysis" de Gabriel Negreira Barbosa, Malware Research an...SegInfo
 
資安控管實務技術
資安控管實務技術資安控管實務技術
資安控管實務技術bv8af4
 
Security Framework from SANS
Security Framework from SANSSecurity Framework from SANS
Security Framework from SANSJeffrey Reed
 
Metasploit (Module-1) - Getting Started With Metasploit
Metasploit (Module-1) - Getting Started With MetasploitMetasploit (Module-1) - Getting Started With Metasploit
Metasploit (Module-1) - Getting Started With MetasploitAnurag Srivastava
 

Similar to Nessus is a network security toolIn a pragraph describe how it is .pdf (20)

Finalppt metasploit
Finalppt metasploitFinalppt metasploit
Finalppt metasploit
 
website vulnerability scanner and reporter research paper
website vulnerability scanner and reporter research paperwebsite vulnerability scanner and reporter research paper
website vulnerability scanner and reporter research paper
 
Cyber-Security-Unit-4.pptx
Cyber-Security-Unit-4.pptxCyber-Security-Unit-4.pptx
Cyber-Security-Unit-4.pptx
 
Vulnerability assessment and penetration testing
Vulnerability assessment and penetration testingVulnerability assessment and penetration testing
Vulnerability assessment and penetration testing
 
Nessus is a network security tool- write a pragraph describe itsto.pdf
Nessus is a network security tool- write a pragraph describe itsto.pdfNessus is a network security tool- write a pragraph describe itsto.pdf
Nessus is a network security tool- write a pragraph describe itsto.pdf
 
OpenVAS
OpenVASOpenVAS
OpenVAS
 
INSECT | Security System Project | 2011
INSECT | Security System Project | 2011INSECT | Security System Project | 2011
INSECT | Security System Project | 2011
 
Cryptography and system security
Cryptography and system securityCryptography and system security
Cryptography and system security
 
Practical White Hat Hacker Training - Vulnerability Detection
Practical White Hat Hacker Training - Vulnerability DetectionPractical White Hat Hacker Training - Vulnerability Detection
Practical White Hat Hacker Training - Vulnerability Detection
 
Network Security Tools
Network Security ToolsNetwork Security Tools
Network Security Tools
 
"Automated Malware Analysis" de Gabriel Negreira Barbosa, Malware Research an...
"Automated Malware Analysis" de Gabriel Negreira Barbosa, Malware Research an..."Automated Malware Analysis" de Gabriel Negreira Barbosa, Malware Research an...
"Automated Malware Analysis" de Gabriel Negreira Barbosa, Malware Research an...
 
資安控管實務技術
資安控管實務技術資安控管實務技術
資安控管實務技術
 
Network scanner
Network scannerNetwork scanner
Network scanner
 
Network scanner
Network scannerNetwork scanner
Network scanner
 
Metasploit
MetasploitMetasploit
Metasploit
 
Security Framework from SANS
Security Framework from SANSSecurity Framework from SANS
Security Framework from SANS
 
Metasploit (Module-1) - Getting Started With Metasploit
Metasploit (Module-1) - Getting Started With MetasploitMetasploit (Module-1) - Getting Started With Metasploit
Metasploit (Module-1) - Getting Started With Metasploit
 
Metasploit
MetasploitMetasploit
Metasploit
 
Security Handbook
 Security Handbook Security Handbook
Security Handbook
 
Types of Vulnerability Scanning An in depth investigation.pdf
Types of Vulnerability Scanning An in depth investigation.pdfTypes of Vulnerability Scanning An in depth investigation.pdf
Types of Vulnerability Scanning An in depth investigation.pdf
 

More from fckindswear

Luthans and Doh (2012) discuss two major forms of communication flow.pdf
Luthans and Doh (2012) discuss two major forms of communication flow.pdfLuthans and Doh (2012) discuss two major forms of communication flow.pdf
Luthans and Doh (2012) discuss two major forms of communication flow.pdffckindswear
 
Is the value of the Manufacturing Plant considered a long term or a .pdf
Is the value of the Manufacturing Plant considered a long term or a .pdfIs the value of the Manufacturing Plant considered a long term or a .pdf
Is the value of the Manufacturing Plant considered a long term or a .pdffckindswear
 
Indicate whether you agree or disagree with the following statements.pdf
Indicate whether you agree or disagree with the following statements.pdfIndicate whether you agree or disagree with the following statements.pdf
Indicate whether you agree or disagree with the following statements.pdffckindswear
 
Identify any relative maxima or minima and intervals on which the fun.pdf
Identify any relative maxima or minima and intervals on which the fun.pdfIdentify any relative maxima or minima and intervals on which the fun.pdf
Identify any relative maxima or minima and intervals on which the fun.pdffckindswear
 
How exposure to an argument through mass media may have influenced o.pdf
How exposure to an argument through mass media may have influenced o.pdfHow exposure to an argument through mass media may have influenced o.pdf
How exposure to an argument through mass media may have influenced o.pdffckindswear
 
Here is the company database--comments can be addedD.pdf
Here is the company database--comments can be addedD.pdfHere is the company database--comments can be addedD.pdf
Here is the company database--comments can be addedD.pdffckindswear
 
Find the IPv6 prefix of the address 20010fc3ca540 a0 10 if the .pdf
Find the IPv6 prefix of the address 20010fc3ca540 a0 10 if the .pdfFind the IPv6 prefix of the address 20010fc3ca540 a0 10 if the .pdf
Find the IPv6 prefix of the address 20010fc3ca540 a0 10 if the .pdffckindswear
 
Explain the kinds of information that must be maintained in fixed as.pdf
Explain the kinds of information that must be maintained in fixed as.pdfExplain the kinds of information that must be maintained in fixed as.pdf
Explain the kinds of information that must be maintained in fixed as.pdffckindswear
 
Dr. P has a culture of stem cells and she wants them to specialize i.pdf
Dr. P has a culture of stem cells and she wants them to specialize i.pdfDr. P has a culture of stem cells and she wants them to specialize i.pdf
Dr. P has a culture of stem cells and she wants them to specialize i.pdffckindswear
 
Describe two ecological roles of fungi. Related concepts decomposer.pdf
Describe two ecological roles of fungi. Related concepts decomposer.pdfDescribe two ecological roles of fungi. Related concepts decomposer.pdf
Describe two ecological roles of fungi. Related concepts decomposer.pdffckindswear
 
Differential equations using phase plane analysis. Task 1 (Romeo .pdf
Differential equations using phase plane analysis. Task 1 (Romeo .pdfDifferential equations using phase plane analysis. Task 1 (Romeo .pdf
Differential equations using phase plane analysis. Task 1 (Romeo .pdffckindswear
 
Develop a stack in c with dynamic memory allocation. Use the followi.pdf
Develop a stack in c with dynamic memory allocation. Use the followi.pdfDevelop a stack in c with dynamic memory allocation. Use the followi.pdf
Develop a stack in c with dynamic memory allocation. Use the followi.pdffckindswear
 
Define a struct type that represents a smartphone. The struct should.pdf
Define a struct type that represents a smartphone. The struct should.pdfDefine a struct type that represents a smartphone. The struct should.pdf
Define a struct type that represents a smartphone. The struct should.pdffckindswear
 
Changes in the economy have determined that for the EZ shipping comp.pdf
Changes in the economy have determined that for the EZ shipping comp.pdfChanges in the economy have determined that for the EZ shipping comp.pdf
Changes in the economy have determined that for the EZ shipping comp.pdffckindswear
 
Broadly speaking, the economy consists of households, firms, governm.pdf
Broadly speaking, the economy consists of households, firms, governm.pdfBroadly speaking, the economy consists of households, firms, governm.pdf
Broadly speaking, the economy consists of households, firms, governm.pdffckindswear
 
A committee consists of 13 Republicans and 16 Democrats. How many dif.pdf
A committee consists of 13 Republicans and 16 Democrats. How many dif.pdfA committee consists of 13 Republicans and 16 Democrats. How many dif.pdf
A committee consists of 13 Republicans and 16 Democrats. How many dif.pdffckindswear
 
2. July 01 Record the dividend received from the foreign subsidiary..pdf
2. July 01 Record the dividend received from the foreign subsidiary..pdf2. July 01 Record the dividend received from the foreign subsidiary..pdf
2. July 01 Record the dividend received from the foreign subsidiary..pdffckindswear
 
You have isolated a new virus, determined it has a lipid envelope,.pdf
You have isolated a new virus, determined it has a lipid envelope,.pdfYou have isolated a new virus, determined it has a lipid envelope,.pdf
You have isolated a new virus, determined it has a lipid envelope,.pdffckindswear
 
Write the Java source code necessary to build a solution for the pro.pdf
Write the Java source code necessary to build a solution for the pro.pdfWrite the Java source code necessary to build a solution for the pro.pdf
Write the Java source code necessary to build a solution for the pro.pdffckindswear
 
Why is agrobacterium tumfaciens useful to Kant biologists Describ.pdf
Why is agrobacterium tumfaciens useful to Kant biologists Describ.pdfWhy is agrobacterium tumfaciens useful to Kant biologists Describ.pdf
Why is agrobacterium tumfaciens useful to Kant biologists Describ.pdffckindswear
 

More from fckindswear (20)

Luthans and Doh (2012) discuss two major forms of communication flow.pdf
Luthans and Doh (2012) discuss two major forms of communication flow.pdfLuthans and Doh (2012) discuss two major forms of communication flow.pdf
Luthans and Doh (2012) discuss two major forms of communication flow.pdf
 
Is the value of the Manufacturing Plant considered a long term or a .pdf
Is the value of the Manufacturing Plant considered a long term or a .pdfIs the value of the Manufacturing Plant considered a long term or a .pdf
Is the value of the Manufacturing Plant considered a long term or a .pdf
 
Indicate whether you agree or disagree with the following statements.pdf
Indicate whether you agree or disagree with the following statements.pdfIndicate whether you agree or disagree with the following statements.pdf
Indicate whether you agree or disagree with the following statements.pdf
 
Identify any relative maxima or minima and intervals on which the fun.pdf
Identify any relative maxima or minima and intervals on which the fun.pdfIdentify any relative maxima or minima and intervals on which the fun.pdf
Identify any relative maxima or minima and intervals on which the fun.pdf
 
How exposure to an argument through mass media may have influenced o.pdf
How exposure to an argument through mass media may have influenced o.pdfHow exposure to an argument through mass media may have influenced o.pdf
How exposure to an argument through mass media may have influenced o.pdf
 
Here is the company database--comments can be addedD.pdf
Here is the company database--comments can be addedD.pdfHere is the company database--comments can be addedD.pdf
Here is the company database--comments can be addedD.pdf
 
Find the IPv6 prefix of the address 20010fc3ca540 a0 10 if the .pdf
Find the IPv6 prefix of the address 20010fc3ca540 a0 10 if the .pdfFind the IPv6 prefix of the address 20010fc3ca540 a0 10 if the .pdf
Find the IPv6 prefix of the address 20010fc3ca540 a0 10 if the .pdf
 
Explain the kinds of information that must be maintained in fixed as.pdf
Explain the kinds of information that must be maintained in fixed as.pdfExplain the kinds of information that must be maintained in fixed as.pdf
Explain the kinds of information that must be maintained in fixed as.pdf
 
Dr. P has a culture of stem cells and she wants them to specialize i.pdf
Dr. P has a culture of stem cells and she wants them to specialize i.pdfDr. P has a culture of stem cells and she wants them to specialize i.pdf
Dr. P has a culture of stem cells and she wants them to specialize i.pdf
 
Describe two ecological roles of fungi. Related concepts decomposer.pdf
Describe two ecological roles of fungi. Related concepts decomposer.pdfDescribe two ecological roles of fungi. Related concepts decomposer.pdf
Describe two ecological roles of fungi. Related concepts decomposer.pdf
 
Differential equations using phase plane analysis. Task 1 (Romeo .pdf
Differential equations using phase plane analysis. Task 1 (Romeo .pdfDifferential equations using phase plane analysis. Task 1 (Romeo .pdf
Differential equations using phase plane analysis. Task 1 (Romeo .pdf
 
Develop a stack in c with dynamic memory allocation. Use the followi.pdf
Develop a stack in c with dynamic memory allocation. Use the followi.pdfDevelop a stack in c with dynamic memory allocation. Use the followi.pdf
Develop a stack in c with dynamic memory allocation. Use the followi.pdf
 
Define a struct type that represents a smartphone. The struct should.pdf
Define a struct type that represents a smartphone. The struct should.pdfDefine a struct type that represents a smartphone. The struct should.pdf
Define a struct type that represents a smartphone. The struct should.pdf
 
Changes in the economy have determined that for the EZ shipping comp.pdf
Changes in the economy have determined that for the EZ shipping comp.pdfChanges in the economy have determined that for the EZ shipping comp.pdf
Changes in the economy have determined that for the EZ shipping comp.pdf
 
Broadly speaking, the economy consists of households, firms, governm.pdf
Broadly speaking, the economy consists of households, firms, governm.pdfBroadly speaking, the economy consists of households, firms, governm.pdf
Broadly speaking, the economy consists of households, firms, governm.pdf
 
A committee consists of 13 Republicans and 16 Democrats. How many dif.pdf
A committee consists of 13 Republicans and 16 Democrats. How many dif.pdfA committee consists of 13 Republicans and 16 Democrats. How many dif.pdf
A committee consists of 13 Republicans and 16 Democrats. How many dif.pdf
 
2. July 01 Record the dividend received from the foreign subsidiary..pdf
2. July 01 Record the dividend received from the foreign subsidiary..pdf2. July 01 Record the dividend received from the foreign subsidiary..pdf
2. July 01 Record the dividend received from the foreign subsidiary..pdf
 
You have isolated a new virus, determined it has a lipid envelope,.pdf
You have isolated a new virus, determined it has a lipid envelope,.pdfYou have isolated a new virus, determined it has a lipid envelope,.pdf
You have isolated a new virus, determined it has a lipid envelope,.pdf
 
Write the Java source code necessary to build a solution for the pro.pdf
Write the Java source code necessary to build a solution for the pro.pdfWrite the Java source code necessary to build a solution for the pro.pdf
Write the Java source code necessary to build a solution for the pro.pdf
 
Why is agrobacterium tumfaciens useful to Kant biologists Describ.pdf
Why is agrobacterium tumfaciens useful to Kant biologists Describ.pdfWhy is agrobacterium tumfaciens useful to Kant biologists Describ.pdf
Why is agrobacterium tumfaciens useful to Kant biologists Describ.pdf
 

Recently uploaded

Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 

Recently uploaded (20)

Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 

Nessus is a network security toolIn a pragraph describe how it is .pdf

  • 1. Nessus is a network security tool In a pragraph describe how it is useful to a networksecurityspecialist and how it may be used for harmfulpurposes by a hacker? Note: provide relaiblerefrences for your answer. Solution Nessus: Nessus is a proprietary vulnerability scanner.Nessus was developed by Tenable network security. How it is useful?: It is extremely good for discovering platform and network device vulnerabilities. •It is a good automated tool for finding Mis configuration,default passwords and known vulnerabilities on systems. •Denails of service against the TCP/IP stack by using malforme packets. •It also has some web scanning options that can be configured,different types of ports scanning. •Another useful Nessus opetion is the ability to enable(or) disable testing of embedded web servers that may be adversely affectd, when scanned. •Nessus provides the ability for the user to adjust how Nessus tests each CGI scrit and determine the duration of the tests. •Nessus also provides special features for Webmirroring. How it may be used harmful purposses?: If some one wanted to hack your local network,the first thing they do is run a vulnerability scan then they'd run a penetration test. •A vulnerability scan digs through the various devices on your network and looks for potential holes,like open port,outdated software with known vulnerabilities.If they find any thing a hacker would exploit them. •Nessus is scan vulnerabilities and shoreup your home network. •Nessus vulnerability scanner is fast and diverse tool that helps any size organization audit their assets for security vulnerabilities. •security center can organize network assets into categories through a combination of network scanning,passive network monitoring and integration with existing asset and network management data tools. •Security Center can manage scans of software under development to defect vulnerabilities,early in the development cycle. •Nessus is used to check the understanding operating system for any vulnerabilities in the
  • 2. operating system application(or) database. •Nessus can be used to check the configuration of the os,application and database. •Nessus can performs a various of Web application audit to test for common aplication vulnerabilities. •Nessus provides special features for Web mirroring,allowing user to specify which part of the website will be crawled(or)not. •Nessus has ability to enable(or)disable testing of embedded web servers that may be adversely affected when scanned. •The pvs can monitor network traffic for encrypted data. •The LCE can be used to monitor any logs generated by software. •LCE can make use of Web and Databse to look for application process and testing.