SlideShare a Scribd company logo
JONES & BARTLETT LEARNING INFORMATION
SYSTEMS SECURITY & ASSURANCE SERIES
LABORATORY MANUAL TO ACCOMPANY
Managing Risk in Information Systems
VERSION 2.0
Powered by vLab
Solution
s
INSTRUCTOR VERSION
Copyright © by Jones & Bartlett Learning, LLC, an Ascend
Learning Company - All Rights Reserved.
Lab #5 Identifying Risks, Threats, and Vulnerabilities in an IT
Infrastructure Using Zenmap® GUI (Nmap) and Nessus®
Reports
Introduction
Imagine a system administrator learns of a server’s
vulnerability, and a service patch is available to solve it.
Unfortunately, simply applying a patch to a server is not
assurance enough that a risk has been mitigated. The system
admin has the option of opening the application and verifying
that the patch has raised the version number as expected. Still,
the admin has no guarantee the vulnerability is closed, at least
not until the vulnerability is directly tested. That’s what
vulnerability scanners are for.
Two vulnerability scanners available to the system
administrator are Nmap® and Nessus®, which produce scan
reports. The purpose of using Zenmap® GUI (Nmap) and
Nessus® reports is to enable you to create network discovery
port scanning reports and vulnerability reports. These reports
can identify the hosts, operating systems, services, applications,
and open ports that are at risk in an organization.
In this lab, you will look at an Nmap® report and a Nessus®
report. You will visit the
http://cve.mitre.org Web site, you will define vulnerability and
exposure according to the site,
and you will learn how to conduct searches of the Common
Vulnerabilities and Exposures (CVE)
listing.
Learning Objectives
Upon completing this lab, you will be able to:
Review a Zenmap® GUI (Nmap) network discovery and port
scanning report and a Nessus®
software vulnerability report.
Identify hosts, operating systems, services, applications, and
open ports on devices from the
Zenmap® GUI (Nmap) scan report.
Identify critical, major, and minor software vulnerabilities from
the Nessus® vulnerability assessment scan report.
Visit the Common Vulnerabilities and Exposures (CVE) online
listing of software vulnerabilities at http://cve.mitre.org and
learn how to conduct searches on the site.
41
Copyright © by Jones & Bartlett Learning, LLC, an Ascend
Learning Company - All Rights Reserved.
43
Hands-On Steps
This is a paper-based lab. To successfully complete the
deliverables for this lab, you will need access to Microsoft®
Word or another compatible word processor. For some labs, you
may also need access to a graphics line drawing application,
such as Visio or PowerPoint. Refer to the Preface of this manual
for information on creating the lab deliverable files.
3. Review the Lab 5 Nmap Scan Report that accompanies this
lab.
4. Using the Lab 5 Nmap Scan Report, answer the following
questions:
synchronize packet (SYN) stealth scan discovers all open
ports on the targeted host.
How many ports are open on the targeted host for the SYN
stealth scan at 13:36?
open ports on devices from the Zenmap GUI (Nmap) scan
report.
Why Nmap Became Popular
Nmap started more than 15 years ago as a simple, command-line
tool. Its one purpose—to send crafted packets to a targeted
Internet Protocol (IP) address to determine what ports are
listening for connections. Knowing what specific ports are
listening, the Nmap operator can infer what services are
running.
For example, if Transmission Control Protocol (TCP) port 80 is
open and listening, it’s a safe assumption the target machine is
a Web server, running the Hypertext Transfer Protocol (HTTP)
service on port 80. Other popular ports such as 21, 25, 137, and
161 mean the services File Transfer Protocol (FTP), Simple
Mail Transfer Protocol (SMTP), Network Basic Input/Output
System (NetBIOS), and Simple Network Management Protocol
(SNMP) are listening, respectively. This made Nmap very
popular with administrators who could then monitor and verify
their systems’ services.
Nmap also became very popular as an easy tool for
reconnaissance. With malicious intent, a person armed with
knowing what services were running could research what
vulnerabilities to exploit. The fast scanning Nmap made
locating the recently discovered exploits called zero-day
exploits very efficient.
Copyright © 2015 by Jones & Bartlett Learning, LLC, an
Ascend Learning Company. All rights reserved.
www.jblearning.com
Instructor Lab Manual
44 | LAB #5 Identifying Risks, Threats, and Vulnerabilities in
an IT Infrastructure
Using Zenmap® GUI (Nmap) and Nessus® Reports
Over the past 15 years, the features available in Nmap have
multiplied several times. The ability to craft packets down to
specific flags and options can make troubleshooting—and
disrupting—networked devices almost limitless. The people and
companies tasked with protecting against hackers must play a
game of cat and mouse against the growing set of options in
tools such as Nmap. Innovation and open source allows this
game to be played indefinitely.
5. Review the Lab 5 Nessus Vulnerability Scan Report that
accompanies this lab.
6. Using the Lab 5 Nessus Vulnerability Scan Report, answer
the following questions:
hosts were scanned?
host?
minor software vulnerabilities?
Nessus is a powerful vulnerability scanner, with a fast-growing
list of available plug-ins. As a vulnerability scanner, the tool
scans the networked devices for potential weaknesses and
exploitable services. As you see from the lab sample, reporting
can be detailed and customized. While still free for personal,
home use, Nessus is also available for commercial use with an
annual subscription fee.
Nessus can be installed and run fairly easily, but here are a few
tips that will produce much more benefit. First, update the plug-
ins on install. By default, Nessus will update plug-ins once a
day. Another tip is to use Nessus as a compliance tool. While it
is by nature a vulnerability tool, one Nessus feature is to load a
configuration file (called an audit file by Nessus) and then scan
with Nessus to verify compliance against your end devices.
6. In the browser, navigate tohttp://cve.mitre.org
7. On the Web site, toward the top left of the screen, click the
CVE List link.
8. Review the CVE List Main Page.
9. Define CVE.
10. On the CVE Page, click the search link
11. In the Search box, type Microsoft® XP 2003 Service Pack 1
and click the search button
12. In your Lab Report file, describe some of the results you
discover.
13.. After viewing the results, conduct another search and this
time, type the words Cisco ASA 5505 Security + and click the
Search button.
19. Describe some of the search results.
This completes the lab. Close the Web browser, if you have not
already done so.
Copyright © 2015 by Jones & Bartlett Learning, LLC, an
Ascend Learning Company. All rights reserved.
www.jblearning.com
Instructor Lab Manual
Introduce your presentation here.
1
Use the design tab to find a subtle background. Use a font color
that is easily read against
the background color. Use the new slide feature on the home tab
to insert a new slide.
Choose the type of slide that is needed. The most common
slides are the Title Content and
the Two Content. They will automatically include the heading
and the section for the
bullets.
2
Be sure to use a heading that explains what is contained on the
slide. Use the same font
sizes throughout the presentation. If you use 48 pt. font for this
heading, use it for all of the
headings. The same goes for the bullet points.
3
The details of the presentation will appear in the notes section.
This is where the narrative
of the live presentation would be if you were going to present
this to an audience. Be sure
to explain what is included on the slide. Place in-text citations
in the notes if source
information is used (Sample, 2016).
4
Most presentations should include graphics of some kind. These
can include images,
graphs, charts, or SmartArt.
5
SmartArt Images can be used to show different types of
information. SmartArt can be
found on the Insert tab. There are various styles of graphics that
display information in
different ways.
6
Include references on a separate slide. The font on this slide can
be smaller to fit the
references. This font is 24 pt.
7
Introduce your presentation here.
1
Use the design tab to find a subtle background. Use a font color
that is easily read against
the background color. Use the new slide feature on the home tab
to insert a new slide.
Choose the type of slide that is needed. The most common
slides are the Title Content and
the Two Content. They will automatically include the heading
and the section for the
bullets.
2
Be sure to use a heading that explains what is contained on the
slide. Use the same font
sizes throughout the presentation. If you use 48 pt. font for this
heading, use it for all of the
headings. The same goes for the bullet points.
3
The details of the presentation will appear in the notes section.
This is where the narrative
of the live presentation would be if you were going to present
this to an audience. Be sure
to explain what is included on the slide. Place in-text citations
in the notes if source
information is used (Sample, 2016).
4
Most presentations should include graphics of some kind. These
can include images,
graphs, charts, or SmartArt.
5
SmartArt Images can be used to show different types of
information. SmartArt can be
found on the Insert tab. There are various styles of graphics that
display information in
different ways.
6
Include references on a separate slide. The font on this slide can
be smaller to fit the
references. This font is 24 pt.
7
JONES & BARTLETT LEARNING    INFORMATION SYSTEMS SECURITY & ASSURA.docx

More Related Content

Similar to JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURA.docx

Finalppt metasploit
Finalppt metasploitFinalppt metasploit
Finalppt metasploitdevilback
 
The Testing Planet Issue 4
The Testing Planet Issue 4The Testing Planet Issue 4
The Testing Planet Issue 4Rosie Sherry
 
Operations: Production Readiness
Operations: Production ReadinessOperations: Production Readiness
Operations: Production Readiness
Amazon Web Services
 
Annotated Bibliography On Unreliable Software
Annotated Bibliography On Unreliable SoftwareAnnotated Bibliography On Unreliable Software
Annotated Bibliography On Unreliable Software
Mary Brown
 
WPF 4 Series: Getting Started
WPF 4 Series: Getting StartedWPF 4 Series: Getting Started
WPF 4 Series: Getting Started
Ghasem Karimi
 
Wpf4 july2010
 Wpf4 july2010 Wpf4 july2010
Wpf4 july2010tedhu
 
Research Assignment For Active Directory
Research Assignment For Active DirectoryResearch Assignment For Active Directory
Research Assignment For Active Directory
Jessica Myers
 
Dairy management system project report..pdf
Dairy management system project report..pdfDairy management system project report..pdf
Dairy management system project report..pdf
Kamal Acharya
 
Building an AI and ML Model Using KNIME and Python.pptx
Building an AI and ML Model Using KNIME and Python.pptxBuilding an AI and ML Model Using KNIME and Python.pptx
Building an AI and ML Model Using KNIME and Python.pptx
ssuser448ad3
 
Networking and Computer Troubleshooting
Networking and Computer TroubleshootingNetworking and Computer Troubleshooting
Networking and Computer TroubleshootingRence Montanes
 
Introduction to Operating Systems
Introduction to Operating SystemsIntroduction to Operating Systems
Introduction to Operating Systems
Suhreed Sarkar
 
Penetration testing dont just leave it to chance
Penetration testing dont just leave it to chancePenetration testing dont just leave it to chance
Penetration testing dont just leave it to chance
Dr. Anish Cheriyan (PhD)
 
From_SPSS Modeler_to_KNIME_v4.7_ebook.pdf
From_SPSS Modeler_to_KNIME_v4.7_ebook.pdfFrom_SPSS Modeler_to_KNIME_v4.7_ebook.pdf
From_SPSS Modeler_to_KNIME_v4.7_ebook.pdf
VeniAgustina1
 
CST 630 Effective Communication - snaptutorial.com
CST 630 Effective Communication - snaptutorial.comCST 630 Effective Communication - snaptutorial.com
CST 630 Effective Communication - snaptutorial.com
donaldzs8
 
CST 630 Exceptional Education - snaptutorial.com
CST 630   Exceptional Education - snaptutorial.comCST 630   Exceptional Education - snaptutorial.com
CST 630 Exceptional Education - snaptutorial.com
DavisMurphyA97
 
Cst 630 Education Organization-snaptutorial.com
Cst 630 Education Organization-snaptutorial.comCst 630 Education Organization-snaptutorial.com
Cst 630 Education Organization-snaptutorial.com
robertlesew6
 
Running Head WINDOWS AND LINUX 1WINDOWS AND LINUX12.docx
Running Head WINDOWS AND LINUX     1WINDOWS AND LINUX12.docxRunning Head WINDOWS AND LINUX     1WINDOWS AND LINUX12.docx
Running Head WINDOWS AND LINUX 1WINDOWS AND LINUX12.docx
jeffsrosalyn
 
System administration with automation
System administration with automationSystem administration with automation
System administration with automation
Shivam Srivastava
 
Cst 630Education Specialist / snaptutorial.com
Cst 630Education Specialist / snaptutorial.comCst 630Education Specialist / snaptutorial.com
Cst 630Education Specialist / snaptutorial.com
McdonaldRyan79
 

Similar to JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURA.docx (20)

Operating system done_by_ashok
Operating system done_by_ashokOperating system done_by_ashok
Operating system done_by_ashok
 
Finalppt metasploit
Finalppt metasploitFinalppt metasploit
Finalppt metasploit
 
The Testing Planet Issue 4
The Testing Planet Issue 4The Testing Planet Issue 4
The Testing Planet Issue 4
 
Operations: Production Readiness
Operations: Production ReadinessOperations: Production Readiness
Operations: Production Readiness
 
Annotated Bibliography On Unreliable Software
Annotated Bibliography On Unreliable SoftwareAnnotated Bibliography On Unreliable Software
Annotated Bibliography On Unreliable Software
 
WPF 4 Series: Getting Started
WPF 4 Series: Getting StartedWPF 4 Series: Getting Started
WPF 4 Series: Getting Started
 
Wpf4 july2010
 Wpf4 july2010 Wpf4 july2010
Wpf4 july2010
 
Research Assignment For Active Directory
Research Assignment For Active DirectoryResearch Assignment For Active Directory
Research Assignment For Active Directory
 
Dairy management system project report..pdf
Dairy management system project report..pdfDairy management system project report..pdf
Dairy management system project report..pdf
 
Building an AI and ML Model Using KNIME and Python.pptx
Building an AI and ML Model Using KNIME and Python.pptxBuilding an AI and ML Model Using KNIME and Python.pptx
Building an AI and ML Model Using KNIME and Python.pptx
 
Networking and Computer Troubleshooting
Networking and Computer TroubleshootingNetworking and Computer Troubleshooting
Networking and Computer Troubleshooting
 
Introduction to Operating Systems
Introduction to Operating SystemsIntroduction to Operating Systems
Introduction to Operating Systems
 
Penetration testing dont just leave it to chance
Penetration testing dont just leave it to chancePenetration testing dont just leave it to chance
Penetration testing dont just leave it to chance
 
From_SPSS Modeler_to_KNIME_v4.7_ebook.pdf
From_SPSS Modeler_to_KNIME_v4.7_ebook.pdfFrom_SPSS Modeler_to_KNIME_v4.7_ebook.pdf
From_SPSS Modeler_to_KNIME_v4.7_ebook.pdf
 
CST 630 Effective Communication - snaptutorial.com
CST 630 Effective Communication - snaptutorial.comCST 630 Effective Communication - snaptutorial.com
CST 630 Effective Communication - snaptutorial.com
 
CST 630 Exceptional Education - snaptutorial.com
CST 630   Exceptional Education - snaptutorial.comCST 630   Exceptional Education - snaptutorial.com
CST 630 Exceptional Education - snaptutorial.com
 
Cst 630 Education Organization-snaptutorial.com
Cst 630 Education Organization-snaptutorial.comCst 630 Education Organization-snaptutorial.com
Cst 630 Education Organization-snaptutorial.com
 
Running Head WINDOWS AND LINUX 1WINDOWS AND LINUX12.docx
Running Head WINDOWS AND LINUX     1WINDOWS AND LINUX12.docxRunning Head WINDOWS AND LINUX     1WINDOWS AND LINUX12.docx
Running Head WINDOWS AND LINUX 1WINDOWS AND LINUX12.docx
 
System administration with automation
System administration with automationSystem administration with automation
System administration with automation
 
Cst 630Education Specialist / snaptutorial.com
Cst 630Education Specialist / snaptutorial.comCst 630Education Specialist / snaptutorial.com
Cst 630Education Specialist / snaptutorial.com
 

More from croysierkathey

1.  Discuss the organization and the family role in every one of the.docx
1.  Discuss the organization and the family role in every one of the.docx1.  Discuss the organization and the family role in every one of the.docx
1.  Discuss the organization and the family role in every one of the.docx
croysierkathey
 
1.  Compare and contrast DEmilios Capitalism and Gay Identity .docx
1.  Compare and contrast DEmilios Capitalism and Gay Identity .docx1.  Compare and contrast DEmilios Capitalism and Gay Identity .docx
1.  Compare and contrast DEmilios Capitalism and Gay Identity .docx
croysierkathey
 
1.Purpose the purpose of this essay is to spread awareness .docx
1.Purpose the purpose of this essay is to spread awareness .docx1.Purpose the purpose of this essay is to spread awareness .docx
1.Purpose the purpose of this essay is to spread awareness .docx
croysierkathey
 
1.  Tell us why it is your favorite film.2.  Talk about the .docx
1.  Tell us why it is your favorite film.2.  Talk about the .docx1.  Tell us why it is your favorite film.2.  Talk about the .docx
1.  Tell us why it is your favorite film.2.  Talk about the .docx
croysierkathey
 
1.What are the main issues facing Fargo and Town Manager Susan.docx
1.What are the main issues facing Fargo and Town Manager Susan.docx1.What are the main issues facing Fargo and Town Manager Susan.docx
1.What are the main issues facing Fargo and Town Manager Susan.docx
croysierkathey
 
1.Writing Practice in Reading a PhotographAttached Files.docx
1.Writing Practice in Reading a PhotographAttached Files.docx1.Writing Practice in Reading a PhotographAttached Files.docx
1.Writing Practice in Reading a PhotographAttached Files.docx
croysierkathey
 
1.Some say that analytics in general dehumanize managerial activitie.docx
1.Some say that analytics in general dehumanize managerial activitie.docx1.Some say that analytics in general dehumanize managerial activitie.docx
1.Some say that analytics in general dehumanize managerial activitie.docx
croysierkathey
 
1.What is the psychological term for the symptoms James experiences .docx
1.What is the psychological term for the symptoms James experiences .docx1.What is the psychological term for the symptoms James experiences .docx
1.What is the psychological term for the symptoms James experiences .docx
croysierkathey
 
1.Write at least 500 words discussing the benefits of using R with H.docx
1.Write at least 500 words discussing the benefits of using R with H.docx1.Write at least 500 words discussing the benefits of using R with H.docx
1.Write at least 500 words discussing the benefits of using R with H.docx
croysierkathey
 
1.What is Starbucks’ ROA for 2012, 2011, and 2010 Why might focusin.docx
1.What is Starbucks’ ROA for 2012, 2011, and 2010 Why might focusin.docx1.What is Starbucks’ ROA for 2012, 2011, and 2010 Why might focusin.docx
1.What is Starbucks’ ROA for 2012, 2011, and 2010 Why might focusin.docx
croysierkathey
 
1.  Discuss the cultural development of the Japanese and the Jewis.docx
1.  Discuss the cultural development of the Japanese and the Jewis.docx1.  Discuss the cultural development of the Japanese and the Jewis.docx
1.  Discuss the cultural development of the Japanese and the Jewis.docx
croysierkathey
 
1.  Discuss at least 2  contextual factors(family, peers,  school,.docx
1.  Discuss at least 2  contextual factors(family, peers,  school,.docx1.  Discuss at least 2  contextual factors(family, peers,  school,.docx
1.  Discuss at least 2  contextual factors(family, peers,  school,.docx
croysierkathey
 
1.Write at least 500 words in APA format discussing how to use senti.docx
1.Write at least 500 words in APA format discussing how to use senti.docx1.Write at least 500 words in APA format discussing how to use senti.docx
1.Write at least 500 words in APA format discussing how to use senti.docx
croysierkathey
 
1.The following clause was added to the Food and Drug Actthe S.docx
1.The following clause was added to the Food and Drug Actthe S.docx1.The following clause was added to the Food and Drug Actthe S.docx
1.The following clause was added to the Food and Drug Actthe S.docx
croysierkathey
 
1.What are social determinants of health  Explain how social determ.docx
1.What are social determinants of health  Explain how social determ.docx1.What are social determinants of health  Explain how social determ.docx
1.What are social determinants of health  Explain how social determ.docx
croysierkathey
 
1.This week, we’ve been introduced to the humanities and have ta.docx
1.This week, we’ve been introduced to the humanities and have ta.docx1.This week, we’ve been introduced to the humanities and have ta.docx
1.This week, we’ve been introduced to the humanities and have ta.docx
croysierkathey
 
1.What are barriers to listening2.Communicators identif.docx
1.What are barriers to listening2.Communicators identif.docx1.What are barriers to listening2.Communicators identif.docx
1.What are barriers to listening2.Communicators identif.docx
croysierkathey
 
1.Timeline description and details There are multiple way.docx
1.Timeline description and details There are multiple way.docx1.Timeline description and details There are multiple way.docx
1.Timeline description and details There are multiple way.docx
croysierkathey
 
1.The PresidentArticle II of the Constitution establishe.docx
1.The PresidentArticle II of the Constitution establishe.docx1.The PresidentArticle II of the Constitution establishe.docx
1.The PresidentArticle II of the Constitution establishe.docx
croysierkathey
 
1.What other potential root causes might influence patient fal.docx
1.What other potential root causes might influence patient fal.docx1.What other potential root causes might influence patient fal.docx
1.What other potential root causes might influence patient fal.docx
croysierkathey
 

More from croysierkathey (20)

1.  Discuss the organization and the family role in every one of the.docx
1.  Discuss the organization and the family role in every one of the.docx1.  Discuss the organization and the family role in every one of the.docx
1.  Discuss the organization and the family role in every one of the.docx
 
1.  Compare and contrast DEmilios Capitalism and Gay Identity .docx
1.  Compare and contrast DEmilios Capitalism and Gay Identity .docx1.  Compare and contrast DEmilios Capitalism and Gay Identity .docx
1.  Compare and contrast DEmilios Capitalism and Gay Identity .docx
 
1.Purpose the purpose of this essay is to spread awareness .docx
1.Purpose the purpose of this essay is to spread awareness .docx1.Purpose the purpose of this essay is to spread awareness .docx
1.Purpose the purpose of this essay is to spread awareness .docx
 
1.  Tell us why it is your favorite film.2.  Talk about the .docx
1.  Tell us why it is your favorite film.2.  Talk about the .docx1.  Tell us why it is your favorite film.2.  Talk about the .docx
1.  Tell us why it is your favorite film.2.  Talk about the .docx
 
1.What are the main issues facing Fargo and Town Manager Susan.docx
1.What are the main issues facing Fargo and Town Manager Susan.docx1.What are the main issues facing Fargo and Town Manager Susan.docx
1.What are the main issues facing Fargo and Town Manager Susan.docx
 
1.Writing Practice in Reading a PhotographAttached Files.docx
1.Writing Practice in Reading a PhotographAttached Files.docx1.Writing Practice in Reading a PhotographAttached Files.docx
1.Writing Practice in Reading a PhotographAttached Files.docx
 
1.Some say that analytics in general dehumanize managerial activitie.docx
1.Some say that analytics in general dehumanize managerial activitie.docx1.Some say that analytics in general dehumanize managerial activitie.docx
1.Some say that analytics in general dehumanize managerial activitie.docx
 
1.What is the psychological term for the symptoms James experiences .docx
1.What is the psychological term for the symptoms James experiences .docx1.What is the psychological term for the symptoms James experiences .docx
1.What is the psychological term for the symptoms James experiences .docx
 
1.Write at least 500 words discussing the benefits of using R with H.docx
1.Write at least 500 words discussing the benefits of using R with H.docx1.Write at least 500 words discussing the benefits of using R with H.docx
1.Write at least 500 words discussing the benefits of using R with H.docx
 
1.What is Starbucks’ ROA for 2012, 2011, and 2010 Why might focusin.docx
1.What is Starbucks’ ROA for 2012, 2011, and 2010 Why might focusin.docx1.What is Starbucks’ ROA for 2012, 2011, and 2010 Why might focusin.docx
1.What is Starbucks’ ROA for 2012, 2011, and 2010 Why might focusin.docx
 
1.  Discuss the cultural development of the Japanese and the Jewis.docx
1.  Discuss the cultural development of the Japanese and the Jewis.docx1.  Discuss the cultural development of the Japanese and the Jewis.docx
1.  Discuss the cultural development of the Japanese and the Jewis.docx
 
1.  Discuss at least 2  contextual factors(family, peers,  school,.docx
1.  Discuss at least 2  contextual factors(family, peers,  school,.docx1.  Discuss at least 2  contextual factors(family, peers,  school,.docx
1.  Discuss at least 2  contextual factors(family, peers,  school,.docx
 
1.Write at least 500 words in APA format discussing how to use senti.docx
1.Write at least 500 words in APA format discussing how to use senti.docx1.Write at least 500 words in APA format discussing how to use senti.docx
1.Write at least 500 words in APA format discussing how to use senti.docx
 
1.The following clause was added to the Food and Drug Actthe S.docx
1.The following clause was added to the Food and Drug Actthe S.docx1.The following clause was added to the Food and Drug Actthe S.docx
1.The following clause was added to the Food and Drug Actthe S.docx
 
1.What are social determinants of health  Explain how social determ.docx
1.What are social determinants of health  Explain how social determ.docx1.What are social determinants of health  Explain how social determ.docx
1.What are social determinants of health  Explain how social determ.docx
 
1.This week, we’ve been introduced to the humanities and have ta.docx
1.This week, we’ve been introduced to the humanities and have ta.docx1.This week, we’ve been introduced to the humanities and have ta.docx
1.This week, we’ve been introduced to the humanities and have ta.docx
 
1.What are barriers to listening2.Communicators identif.docx
1.What are barriers to listening2.Communicators identif.docx1.What are barriers to listening2.Communicators identif.docx
1.What are barriers to listening2.Communicators identif.docx
 
1.Timeline description and details There are multiple way.docx
1.Timeline description and details There are multiple way.docx1.Timeline description and details There are multiple way.docx
1.Timeline description and details There are multiple way.docx
 
1.The PresidentArticle II of the Constitution establishe.docx
1.The PresidentArticle II of the Constitution establishe.docx1.The PresidentArticle II of the Constitution establishe.docx
1.The PresidentArticle II of the Constitution establishe.docx
 
1.What other potential root causes might influence patient fal.docx
1.What other potential root causes might influence patient fal.docx1.What other potential root causes might influence patient fal.docx
1.What other potential root causes might influence patient fal.docx
 

Recently uploaded

The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
Krisztián Száraz
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
kimdan468
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
The Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptxThe Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptx
DhatriParmar
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
chanes7
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
gb193092
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 

Recently uploaded (20)

The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
The Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptxThe Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptx
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 

JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURA.docx

  • 1. JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES LABORATORY MANUAL TO ACCOMPANY Managing Risk in Information Systems VERSION 2.0 Powered by vLab
  • 3. Copyright © by Jones & Bartlett Learning, LLC, an Ascend Learning Company - All Rights Reserved. Lab #5 Identifying Risks, Threats, and Vulnerabilities in an IT Infrastructure Using Zenmap® GUI (Nmap) and Nessus® Reports Introduction Imagine a system administrator learns of a server’s vulnerability, and a service patch is available to solve it. Unfortunately, simply applying a patch to a server is not assurance enough that a risk has been mitigated. The system admin has the option of opening the application and verifying that the patch has raised the version number as expected. Still, the admin has no guarantee the vulnerability is closed, at least not until the vulnerability is directly tested. That’s what vulnerability scanners are for.
  • 4. Two vulnerability scanners available to the system administrator are Nmap® and Nessus®, which produce scan reports. The purpose of using Zenmap® GUI (Nmap) and Nessus® reports is to enable you to create network discovery port scanning reports and vulnerability reports. These reports can identify the hosts, operating systems, services, applications, and open ports that are at risk in an organization. In this lab, you will look at an Nmap® report and a Nessus® report. You will visit the http://cve.mitre.org Web site, you will define vulnerability and exposure according to the site, and you will learn how to conduct searches of the Common Vulnerabilities and Exposures (CVE) listing. Learning Objectives Upon completing this lab, you will be able to: Review a Zenmap® GUI (Nmap) network discovery and port scanning report and a Nessus® software vulnerability report.
  • 5. Identify hosts, operating systems, services, applications, and open ports on devices from the Zenmap® GUI (Nmap) scan report. Identify critical, major, and minor software vulnerabilities from the Nessus® vulnerability assessment scan report. Visit the Common Vulnerabilities and Exposures (CVE) online listing of software vulnerabilities at http://cve.mitre.org and learn how to conduct searches on the site. 41 Copyright © by Jones & Bartlett Learning, LLC, an Ascend Learning Company - All Rights Reserved. 43
  • 6. Hands-On Steps This is a paper-based lab. To successfully complete the deliverables for this lab, you will need access to Microsoft® Word or another compatible word processor. For some labs, you may also need access to a graphics line drawing application, such as Visio or PowerPoint. Refer to the Preface of this manual for information on creating the lab deliverable files. 3. Review the Lab 5 Nmap Scan Report that accompanies this lab. 4. Using the Lab 5 Nmap Scan Report, answer the following questions:
  • 7. synchronize packet (SYN) stealth scan discovers all open ports on the targeted host. How many ports are open on the targeted host for the SYN stealth scan at 13:36? open ports on devices from the Zenmap GUI (Nmap) scan report. Why Nmap Became Popular Nmap started more than 15 years ago as a simple, command-line tool. Its one purpose—to send crafted packets to a targeted Internet Protocol (IP) address to determine what ports are listening for connections. Knowing what specific ports are listening, the Nmap operator can infer what services are running. For example, if Transmission Control Protocol (TCP) port 80 is open and listening, it’s a safe assumption the target machine is a Web server, running the Hypertext Transfer Protocol (HTTP)
  • 8. service on port 80. Other popular ports such as 21, 25, 137, and 161 mean the services File Transfer Protocol (FTP), Simple Mail Transfer Protocol (SMTP), Network Basic Input/Output System (NetBIOS), and Simple Network Management Protocol (SNMP) are listening, respectively. This made Nmap very popular with administrators who could then monitor and verify their systems’ services. Nmap also became very popular as an easy tool for reconnaissance. With malicious intent, a person armed with knowing what services were running could research what vulnerabilities to exploit. The fast scanning Nmap made locating the recently discovered exploits called zero-day exploits very efficient. Copyright © 2015 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved. www.jblearning.com Instructor Lab Manual
  • 9. 44 | LAB #5 Identifying Risks, Threats, and Vulnerabilities in an IT Infrastructure Using Zenmap® GUI (Nmap) and Nessus® Reports Over the past 15 years, the features available in Nmap have multiplied several times. The ability to craft packets down to specific flags and options can make troubleshooting—and disrupting—networked devices almost limitless. The people and companies tasked with protecting against hackers must play a game of cat and mouse against the growing set of options in tools such as Nmap. Innovation and open source allows this game to be played indefinitely. 5. Review the Lab 5 Nessus Vulnerability Scan Report that accompanies this lab. 6. Using the Lab 5 Nessus Vulnerability Scan Report, answer the following questions: hosts were scanned?
  • 10. host? minor software vulnerabilities? Nessus is a powerful vulnerability scanner, with a fast-growing list of available plug-ins. As a vulnerability scanner, the tool scans the networked devices for potential weaknesses and exploitable services. As you see from the lab sample, reporting can be detailed and customized. While still free for personal, home use, Nessus is also available for commercial use with an annual subscription fee. Nessus can be installed and run fairly easily, but here are a few tips that will produce much more benefit. First, update the plug- ins on install. By default, Nessus will update plug-ins once a day. Another tip is to use Nessus as a compliance tool. While it is by nature a vulnerability tool, one Nessus feature is to load a configuration file (called an audit file by Nessus) and then scan with Nessus to verify compliance against your end devices. 6. In the browser, navigate tohttp://cve.mitre.org
  • 11. 7. On the Web site, toward the top left of the screen, click the CVE List link. 8. Review the CVE List Main Page. 9. Define CVE. 10. On the CVE Page, click the search link 11. In the Search box, type Microsoft® XP 2003 Service Pack 1 and click the search button 12. In your Lab Report file, describe some of the results you discover. 13.. After viewing the results, conduct another search and this time, type the words Cisco ASA 5505 Security + and click the Search button. 19. Describe some of the search results.
  • 12. This completes the lab. Close the Web browser, if you have not already done so.
  • 13.
  • 14. Copyright © 2015 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved. www.jblearning.com Instructor Lab Manual Introduce your presentation here. 1 Use the design tab to find a subtle background. Use a font color that is easily read against the background color. Use the new slide feature on the home tab to insert a new slide. Choose the type of slide that is needed. The most common slides are the Title Content and the Two Content. They will automatically include the heading and the section for the
  • 15. bullets. 2 Be sure to use a heading that explains what is contained on the slide. Use the same font sizes throughout the presentation. If you use 48 pt. font for this heading, use it for all of the headings. The same goes for the bullet points. 3 The details of the presentation will appear in the notes section. This is where the narrative of the live presentation would be if you were going to present this to an audience. Be sure to explain what is included on the slide. Place in-text citations in the notes if source information is used (Sample, 2016). 4
  • 16. Most presentations should include graphics of some kind. These can include images, graphs, charts, or SmartArt. 5 SmartArt Images can be used to show different types of information. SmartArt can be found on the Insert tab. There are various styles of graphics that display information in different ways. 6 Include references on a separate slide. The font on this slide can be smaller to fit the references. This font is 24 pt.
  • 17. 7 Introduce your presentation here. 1 Use the design tab to find a subtle background. Use a font color that is easily read against the background color. Use the new slide feature on the home tab to insert a new slide. Choose the type of slide that is needed. The most common slides are the Title Content and the Two Content. They will automatically include the heading and the section for the bullets. 2
  • 18. Be sure to use a heading that explains what is contained on the slide. Use the same font sizes throughout the presentation. If you use 48 pt. font for this heading, use it for all of the headings. The same goes for the bullet points. 3 The details of the presentation will appear in the notes section. This is where the narrative of the live presentation would be if you were going to present this to an audience. Be sure to explain what is included on the slide. Place in-text citations in the notes if source information is used (Sample, 2016). 4 Most presentations should include graphics of some kind. These can include images, graphs, charts, or SmartArt.
  • 19. 5 SmartArt Images can be used to show different types of information. SmartArt can be found on the Insert tab. There are various styles of graphics that display information in different ways. 6 Include references on a separate slide. The font on this slide can be smaller to fit the references. This font is 24 pt. 7