Lab #5: Assessment Worksheet
Identify Threats and Vulnerabilities in an IT
Infrastructure
Overview
One of the most important first steps to risk management and
implementing a security strategy is to identify all resources and hosts
within the IT infrastructure. Once you identify the workstations and
servers, you now must then find the threats and vulnerabilities found
on these workstations and servers.
Servers that support mission critical applications require security
operations and management procedures to ensure C-I-A throughout.
Servers that house customer privacy data or intellectual property
require additional security controls to ensure the C-I-A of that data. This
lab requires the students to identify threats and vulnerabilities found
within the Workstation, LAN, and Systems/Applications Domains.
2. Which scanning application is better for performing a network
discovery reconnaissance probing of an IP network infrastructure?
CVE is a list of information security vulnerabilities and exposures that
aims to provide common names for publicly known problems
12. Explain how the CVE search listing can be a tool for security
practitioners and a tool for hackers.
It enables the users to identify system weaknesses. For hackers, this
may be extremely useful information. They could utilize this
vulnerability to conduct an attack if he knows about it. This will assist
the administrator in identifying and resolving problems, or at the very
least mitigating them.
13. What must an IT organization do to ensure that software updates
and security patches are implemented timely?
Scan for vulnerabilities and find the patch to fix them
14. What would you define in a vulnerability management policy for an
organization?
The possible risk involved with vulnerabilities that were found on
systems and how to plan to mitigate them.
15. Which tool should be used first if performing an ethical hacking
penetration test and why?
When executing an ethical hacking penetration test, Nmap should be
used. Because it's a robust port scanner and auditing tool. It is also an
open-source application that may run on a variety of operating
systems, including Windows, Linux, and Mac OS.