Welcome to EssayHotline!

We take care of your tight deadline essay for you! Place your order today and enjoy convenience.

Determine if weak passwords are being used on Linux systems. Determine which security updates are required for the Linux systems.

Look at the attached MBSA and OpenVAS screenshots attached
For Windows OS using Microsoft Baseline Security Analyzer (MBSA):
1. Determine if Windows administrative vulnerabilities are present.
2. Determine if weak passwords are being used on Windows accounts.
3. Report which security updates are required on each individual system.
4. The tool for Windows OS (MBSA) provides dynamic assessment of missing security updates. Scan one or more computers by domain, IP address range, or other grouping.
Use the OpenVAS tool to complete the following:
1. Determine if Linux vulnerabilities are present.
2. Determine if weak passwords are being used on Linux systems.
3. Determine which security updates are required for the Linux systems.
4. The tool for Linux OS (OpenVAS) provides dynamic assessment of missing security updates. Scan one or more computers by domain, IP address range, or other grouping.
5. Once complete, provide a detailed report and recommendations on how to make your system a more secure working environment.

Create the Security Assessment Report
By using security vulnerability assessment tools such as MBSA and OpenVAS, you now have a better understanding the system’s security status. Based on the results provided by these tools, “please see the screen shots included” you will create the Security Assessment Report (SAR).
In your report to the leadership, emphasize the benefits of using a free security tool such as MBSA. Then make a recommendation for using these types of tools (e.g., MBSA and OpenVAS), including the results you found for both.
Remember to include analyses and conclusions in the SAR deliverable as follows:
1. After you provide a description of the methodology you used to make your security assessment, provide the actual data from the tools, the status of security and patch updates, security recommendations, and specific remediation guidance for your senior leadership.
2. Include any risk assessments associated with the security recommendations, and propose ways to address the risk either by accepting it, transferring it, mitigating it, or eliminating it.

© 2024 EssayHotline.com. All Rights Reserved. | Disclaimer: for assistance purposes only. These custom papers should be used with proper reference.