Temple University

Week Four Summary

Vulnerability scanning is important one can find the weaknesses and avenues of approach an enemy can find. You are finding those weaknesses out first in order to fix them, before an enemy can find the weaknesses and exploit them. Nessus is a great yet expensive vulnerability scanner. You must have the permission of the security team and senior management before scanning, since Nessus is viewed as a hacker recon tool. You can scan for one host, or your whole network if desired. The results will be included in a text document, with the indicated vulnerabilities and CVEs. One must keep this document secret from outside eyes, since information about company vulnerabilities would be saving your enemies the work of recon. You must combine other vulnerability scanners in with your assessment to truly uncover all the weaknesses in your network or hosts.

News Article:

http://www.bbc.com/news/world-us-canada-34229439

Obama states that Chinese hacking of American assets is unacceptable, and that he will not be staying at any Chinese funded hotels. In terms of cyber warfare, Obama stated, “I guarantee you, we will win if we have to.” MURICAH!

Leave a Reply

Your email address will not be published. Required fields are marked *