AN INTRODUCTION TO INFORMATION AND CYBER SECURITY - Thesis Example

Comments (0) Cite this document
Summary
Wireshark not only provides vulnerability analysis, as its functionality can be resembled with “tcpdump.” It emphasizes protocols and represents data streams on the GUI. The major advantage…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER95.5% of users find it useful
AN INTRODUCTION TO INFORMATION AND CYBER SECURITY
Read TextPreview

Extract of sample "AN INTRODUCTION TO INFORMATION AND CYBER SECURITY"

Download file to see previous pages Nessus, on the other hand, is used in more than 75,000 organizations around the globe and it is considered to be one of the world’s most popular vulnerability scanner (Ferguson, n.d.). However, the third version, i.e. version 3, has now been converted to a proprietary license as the scanning engine is still free and updates are also available after a week on a release.
When Nessus is incorporated in a large enterprise, most probably, a government organization such as Department of Defense (DOD) networks, it will initiate a port scan and target the defined host or a network. After opening the port, it examines all the services that are running on the system or network and tests all the detected services against vulnerabilities defined in the Nessus vulnerability database (Kim, n.d.). As this tool can develop a testing platform for network resilience, the report generation is very comprehensive that is ideal for large enterprises. As it is an easy remote based vulnerability analysis tool, it can be best suited for large enterprises that are geographically dispersed in more than one continent (Kim, n.d.). Moreover, in an ideal scenario where corporate networks for large organizations contain many client/server architectures, Nessus will detect the clients and the server automatically when connected to the specific network at a specific location (Kim, n.d.). Network security professionals of a large enterprise can customize plugins, as per their requirements, as the tool has its own scripting language for defining methods to test and identify network for vulnerabilities (Kim, n.d.). The tool will penetrate within the corporate network and start scanning anonymous File Transfer Protocol (FTP) and for the client/server architecture, secure socket Layer (SSL) will provide an additional layer of security for report results. However, for false positive detection, a validity check is required on the reports from ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“AN INTRODUCTION TO INFORMATION AND CYBER SECURITY Thesis”, n.d.)
AN INTRODUCTION TO INFORMATION AND CYBER SECURITY Thesis. Retrieved from https://studentshare.org/information-technology/1681358-an-introduction-to-information-and-cyber-security
(AN INTRODUCTION TO INFORMATION AND CYBER SECURITY Thesis)
AN INTRODUCTION TO INFORMATION AND CYBER SECURITY Thesis. https://studentshare.org/information-technology/1681358-an-introduction-to-information-and-cyber-security.
“AN INTRODUCTION TO INFORMATION AND CYBER SECURITY Thesis”, n.d. https://studentshare.org/information-technology/1681358-an-introduction-to-information-and-cyber-security.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF AN INTRODUCTION TO INFORMATION AND CYBER SECURITY

Cyber Security

...? Cyber security 02-02 Cyber security According to www.thefreedictionary.com, anything that is at a risk of emotional or physical grievance is vulnerable. Talking about cyber security, vulnerability is a security weakness; anything that can be harmed easily or destroyed effortlessly is said to be ‘vulnerable’. Every now and then new programs are developed and information technology managers are harassed by hackers as their systems are always vulnerable to external threats. In the current age of union of communication and technology, one cannot resist or keep away from being affected by internet,...
10 Pages(2500 words)Coursework

Information warfare and cyber security

...and computers within the military arena has given rise to various force multipliers like Network Centric Warfare, Information Operations, and the C4I2SR Systems, and this age of information warfare and cyber terrorism often referred to as Revolution in Military Affairs (RMA), has not only changed the way modern wars are fought, but have also opened a new perspective in the domination of a new arena, the cyber space. This paper will take an in-depth look into the sphere of information warfare. Information warfare and cyber security 1 Introduction “One hundred victories in one hundred...
40 Pages(10000 words)Research Paper

Cyber Security and Information Security

...?Textbook: Management of Information Security by Whitman and Mattord Chapter 2 P. 70 Using a web search engine, find an article from a reputable source published within the past six months that reports on the relative risk that comes from inside the organization as opposed to risk that comes from external sources. If the article notes that this relative risk is changing and to what does the article attribute the change? Phneah (2013) reports on how organizational risk coming from inside sources is currently evolving and insiders that pose a risk are working in different and more complex ways. For example, Phneah (2013) suggests that previously, risks from inside the company were previously more about...
4 Pages(1000 words)Assignment

Cyber security

...CYBER SECURITY Cyber Security E-government comes at a cost. Is there a trade-off that occurs between the security of federal systems and the cost savings from reduced paperwork? I concur with the response given to the question since it has fully explored the benefits and setbacks of e-government against the benefits of manual storage of information. The answer has outlined the gains the government enjoys for employing technology to store its information. It has clearly shown that substantial amounts of money can be saved in terms of money invested in storage space. This is a true reflection of what takes place when...
2 Pages(500 words)Coursework

Cyber security

...Cyber Security Cyber Security Affiliation If someone asked you for advice on what he or she should do first to get started onIntrusion Detection, what would you recommend? If someone asks me for advice on what he or she should do first to get started on intrusion detection then I would suggest him to think about what advantages or opportunities he expects from the deal he is going to make. In this scenario, one excellent starting point can be from looking at the impact of previous intrusions (Bloedorn, Christiansen, Hill, Skorupka, Talbot, & Tivel, 2002). However, if he or she has been caused to experience intrusions and hacking act before, they will be acquainted with...
1 Pages(250 words)Coursework

Cyber Security

...Insert Introduction The world today is more interconnected than ever before. As many people become more dependent on modern technology, there has equally been an emergence of vulnerability to cyber attack such as security breaches, spear phishing and social media fraud. With all its advantages, increased connectivity means increased risk incidences involving theft, abuse and fraud. Ensuring cyber security is the role of every individual as it’s everyone’s duty to ensure it is safer, more secure and resilient (Marshall, 67). Cyber security refers to the body of technologies, processes and practices...
1 Pages(250 words)Essay

Cyber Security

...is a generic term covering the multiplicity of crimes found in penal codes or in legislation having the use of computers as a center component (Girasa, 2002). Cybercrime can be analyzed in a narrow and broad sense. Narrowly, it can be defined as an illegal activity related to computer and computer aided services. Broadly, it refers to an illegal work, which can be committed by means relating to computers or any kind of network system. The concept of cyber security in modern world can be discussed in light of increasing cyber threat. Cyber security can be defined as a system which is used by the government and various organizations to protect...
10 Pages(2500 words)Term Paper

Cyber Security

...Cyber Security Cyber Security There is a pressing need for organization’s antivirus policy to specify that anti-virus be configuredin a way that they quarantine files infected with viruses rather than automatically deleting them. Deleting the infected files often lead to non-functioning of the application or operating system, an aspect that can temporarily paralyze operations of a business. This would automatically result into losses, especially if the problem is serious (Mishra, 2013). Experts suggest deleting the infected files as the worst option an antivirus can resort to. Furthermore, some antivirus applications identify certain types of files as infected while...
1 Pages(250 words)Essay

AN INTRODUCTION TO INFORMATION AND CYBER SECURITY

...Information Security 1 INFORMATION SECURITY INTRODUCTION The role of computer networks as an integral part of our daily lives makes information security critical for individuals and organizations. The amount of personal and corporate information stored on networks, and the variety of threats to information, combine to form pressing need for increased protection of that information. Although this technology enables people to be more productive and allows them to access a wide range of information, it also comes with it a lot of security issues because if the information in our system is hacked the consequences can be dire indeed. Primarily, security is protection from danger. There are various types of security e.g., operation... control...
4 Pages(1000 words)Thesis

European fantasy sport analysis

4 Pages(1000 words)Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Thesis on topic AN INTRODUCTION TO INFORMATION AND CYBER SECURITY for FREE!

Contact Us