Temple University

MIS-5211 Week 4 Reading Summary & Cyber Security News…

Review my following MIS-5211_Wk4 class preparation information findings:

Week 4 Readings, Question, and In the Cyber Security News…

  1. Summarize one key point from each assigned reading…

In order to proactively check + protect one’s own business computer network from on-going vulnerabilities (IN & OUT), one can periodically deploy the robust & low-cost NESSUS computer network vulnerability scanner (identify issues & provide fix-it information.) Additionally for matter of convenience, use a UNIX-based portable laptop computer with the NESSUS Server & Client already installed (check for network vulnerabilities at many different places on one’s business networks.)

  1. Question to classmates (facilitates discussion) from assigned reading…

Since the NESSUS network vulnerability system is dependent on special current known “plug-ins” (similar to anti-virus software definitions), how then to detect & provide fix-it information for the unknown, new network vulnerabilities?

*NOTE: Review the latest NESSUS plug-ins from the Tenable Network Security organization…

www.tenable.com/plugins/index.php?view=newest

  1. Identify, read, and post to our blog a current event article regarding ethical hacking & penetration testing (follow theme topic of the week, or other interesting related article)…

In the Cyber Security News lately…

CAPTCHA-bypassing malware found in Google Play…

www.ehackingnews.com/2015/09/captcha-bypassing-malware-found-in.html

“Bitdefender Security Researcher, Liviu Arsene has recently revealed that a malware, identified as Android.Trojan.MKero.A has found its way into the highly legitimate apps in Android powered Google Play Store by successfully evading the Google Bouncer’s vetting algorithms. This can cause a lot of trouble for the vendors who provide paid premium services of their products as the malware can now make the services available for free.”

2 Responses to MIS-5211 Week 4 Reading Summary & Cyber Security News…

Leave a Reply

Your email address will not be published. Required fields are marked *