Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

What is the difference between mbsa and microsoft update

29/11/2021 Client: muhammad11 Deadline: 2 Day

Step 1: Defining the OS
The audience for your security assessment report (SAR) is the leadership of your organization, which is made up of technical and nontechnical staff. Some of your audience will be unfamiliar with operating systems (OS). As such, you will begin your report with a brief explanation of operating systems fundamentals and the types of information systems.

Click on and read the following resources that provide essential information you need to know before creating a thorough and accurate OS explanation:

operating systems fundamentals
the applications of the OS
The Embedded OS
information system architecture
cloud computing
web architecture
After reviewing the resources, begin drafting the OS overview to incorporate the following:

Explain the user's role in an OS.
Explain the differences between kernel applications of the OS and the applications installed by an organization or user.
Describe the embedded OS.
Describe how the systems fit in the overall information system architecture, of which cloud computing is an emerging, distributed computing network architecture..
Include a brief definition of operating systems and information systems in your SAR.

Step 2: OS Vulnerabilities
You just summarized operating systems and information systems for leadership. In your mind, you can already hear leadership saying "So what?" The organization's leaders are not well versed in operating systems and the threats and vulnerabilities in operating systems, so in your SAR, you decide to include an explanation of advantages and disadvantages of the different operating systems and their known vulnerabilities.

Prepare by first reviewing the different types of vulnerabilities and intrusions explained in these resources:

Windows vulnerabilities
Linux vulnerabilities
Mac OS vulnerabilities
SQL PL/SQL, XML and other injections
Based on what you gathered from the resources, compose the OS vulnerability section of the SAR. Be sure to:

Explain Windows vulnerabilities and Linux vulnerabilities.
Explain the Mac OS vulnerabilities, and vulnerabilities of mobile devices.
Explain the motives and methods for intrusion of the MS and Linux operating systems;
Explain the types of security awareness technologies such as intrusion detection and intrusion prevention systems.
Describe how and why different corporate and government systems are targets.
Describe different types of intrusions such as SQL PL/SQL, XML, and other injections
You will provide leadership with a brief overview of vulnerabilities in your SAR.

Step 3: Preparing for the Vulnerability Scan
You have just finished defining the vulnerabilities an OS can have. Soon you will perform vulnerability scanning and vulnerability assessments on the security posture of the organization's operating systems. But first, consider your plan of action. Read these two resources to be sure you fully grasp the purpose, goals, objectives, and execution of vulnerability assessments and security updates:

Vulnerability assessments
Patches
Then provide the leadership with the following:

Include a description of the methodology you proposed to assess the vulnerabilities of the operating systems. Provide an explanation and reasoning of how the methodology you propose, will determine the existence of those vulnerabilities in the organization’s OS.
Include a description of the applicable tools to be used, and the limitations of the tools and analyses, if any. Provide an explanation and reasoning of how the applicable tools to be used, you propose, will determine the existence of those vulnerabilities in the organization’s OS.
Include the projected findings from using these vulnerability assessment tools.
In your report, discuss the strength of passwords, any Internet Information Services' administrative vulnerabilities, SQL server administrative vulnerabilities, and other security updates and management of patches, as they relate to OS vulnerabilities.

Step 4: Vulnerability Assessment Tools for OS and Applications
Note: You will use the tools in Workspace for this step. If you need help outside the classroom, register for the CLAB 699 Cyber Computing Lab Assistance (go to the Discussions List for registration information). Primary lab assistance is available from a team of lab assistants. Lab assistants are professionals and are trained to help you.

Click here to access the instructions for Navigating the Workspace and the Lab Setup.

Enter Workspace and complete the lab activities related to operating system vulnerabilities.

Click here to access the Project 2 Workspace Exercise Instructions. Explore the tutorials and user guides to learn more about the tools you will use.

You've prepared for your assessment; now it's time to perform.

Security and vulnerability assessment analysis tools, such as Microsoft Baseline Security Analyzer (MBSA) for Windows OS and OpenVAS for Linux OS, are stand-alone tools designed to provide a streamlined method for identifying common security misconfigurations and missing security updates for the operating systems and applications. These tools work on layers 5-7 of the Open System Interconnection (OSI) model.

Your leadership will want to understand the differences and commonalities in the capabilities of both tools and will want this included in the SAR.

Use the tools' built-in checks to complete the following for Windows OS (e.g., using Microsoft Baseline Security Analyzer, MBSA):

Determine if Windows administrative vulnerabilities are present.
Determine if weak passwords are being used on Windows accounts.
Report which security updates are required on each individual system.
You noticed that the tool you used for Windows OS (i.e., MBSA) provides dynamic assessment of missing security updates. MBSA provides dynamic assessment of missing security updates. Scan one or more computers by domain, IP address range, or other grouping.
Once complete, provide a detailed report and recommendations on how to make your system a more secure working environment. In this case, a tool such as MBSA will create and store individual XML security reports for each computer scanned and will display the reports in the graphical user interface in HTML.
You will also complete a similar exercise for Linux OS (e.g., using the OpenVAS tool). Select the following links to learn more about OpenVAS and computer networks:

OpenVAS
Computer Networks
Utilize the OpenVAS tool to complete the following:

Determine if Linux vulnerabilities are present.
Determine if weak passwords are being used on Linux systems.
Determine which security updates are required for the Linux systems.
You noticed that the tool you used for Linux OS (i.e., OpenVAS) provides dynamic assessment of missing security updates. MBSA provides dynamic assessment of missing security updates. Scan one or more computers by domain, IP address range, or other grouping.
Once complete, provide a detailed report and recommendations on how to make your system a more secure working environment
Knowledge acquired from this Workspace exercise and capability of this tool will help your company's client organizations secure the computer networks’ resources and protect corporate data from being stolen.

Validate and record the benefits of using these types of tools. You will include this in the SAR.

Step 5: The Security Assessment Report
By utilizing security vulnerability assessment tools, such as MBSA and OpenVAS, you now have a better understanding of your system's security status. Based on the results provided by these tools, as well as your learning from the previous steps, you will create the Security Assessment Report (SAR).

In your report to the leadership, emphasize the benefits of using a free security tool such as MBSA. Then make a recommendation for using these types of tools (i.e., MBSA and OpenVAS), including the results you found for both.

Remember to include these analyses and conclusions in the SAR deliverable:

After you provide a description of the methodology you used to make your security assessment, you will provide the actual data from the tools, the status of security and patch updates, security recommendations, and offer specific remediation guidance, to your senior leadership.
You will include any risk assessments associated with the security recommendations, and propose ways to address the risk either by accepting the risk, transferring the risk, mitigating the risk, or eliminating the risk.
Include your SAR in your final deliverable to leadership.

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Exam Attempter
Assignment Solver
Financial Hub
Financial Solutions Provider
Fatimah Syeda
Write My Coursework
Writer Writer Name Offer Chat
Exam Attempter

ONLINE

Exam Attempter

I reckon that I can perfectly carry this project for you! I am a research writer and have been writing academic papers, business reports, plans, literature review, reports and others for the past 1 decade.

$16 Chat With Writer
Assignment Solver

ONLINE

Assignment Solver

I can assist you in plagiarism free writing as I have already done several related projects of writing. I have a master qualification with 5 years’ experience in; Essay Writing, Case Study Writing, Report Writing.

$39 Chat With Writer
Financial Hub

ONLINE

Financial Hub

I have read your project description carefully and you will get plagiarism free writing according to your requirements. Thank You

$17 Chat With Writer
Financial Solutions Provider

ONLINE

Financial Solutions Provider

I have worked on wide variety of research papers including; Analytical research paper, Argumentative research paper, Interpretative research, experimental research etc.

$49 Chat With Writer
Fatimah Syeda

ONLINE

Fatimah Syeda

I reckon that I can perfectly carry this project for you! I am a research writer and have been writing academic papers, business reports, plans, literature review, reports and others for the past 1 decade.

$27 Chat With Writer
Write My Coursework

ONLINE

Write My Coursework

I will be delighted to work on your project. As an experienced writer, I can provide you top quality, well researched, concise and error-free work within your provided deadline at very reasonable prices.

$39 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

IA week7 DB - Www rafe videos com - Module 07 Quiz - Naeyc classroom environment checklist - Honda valve adjustment tool harbor freight - Contemporary issues in business management - Cover letter working with youth - Delta airlines case analysis - Valproate side effects mnemonic - Early houses of refuge were run using a - Journal Entry Model #1 - Module 1 Discussion - Brian blessed gordon's alive mp3 - Find dew point temperature psychrometric chart - 8732 rainbow ave kings beach ca 96143 - Lil wayne lighter flick and inhale lyrics - Blocking between roof rafters - Kendra- History Dis- - Need help with English Comp. II - So we ll go no more a roving poem - Thesis - Format a2 dimension cm - Ethical Dilemmas - I need help - Criticism of kotter's 8 step model - What are the needs and wants of ancient communities - Employee salary details program in python - Collaborative Learning Community (CLC) assignment. - Why should students have phones in school - Kahalagahan ng pag aaral ng ekonomiks - Pepsico financial ratios analysis - What influenced arthur miller to write the crucible - Eveline by james joyce character analysis - Roald dahl chocolate taster - Peter symonds student intranet - Gerber baby food international marketing - Magnetic field of a finite current sheet - The Apology Response Paper - Where did the hand jive originate - Dfs namespace server best practice - BHD404 Discussion Module 4 Response - Trevor noah languages are scary - Hotel saville in south yarra - Mccrae and costa trait theory - Human resource management in australia strategy people performance 5th ed - The yellow wallpaper answer key - Street fighter resurrection terroriser scene - Text to text connections books examples - Discussion question and Research paper (two seperate work) - Manor vets edgbaston birmingham - Organizational Leadership and Decision Making 5 - Nimble cs300 end of life date - The roman colosseum functioned as a large "audience hall"--a place for governmental meetings. - John trimble writing with style - Pediatric well visit soap note - Dr hugh bartholomeusz greenslopes - Paddle com marke iat paypal - Lil jiggy turkey call jig for sale - Hcf fit and free travel insurance - Bug off exterminators accounting problem - Week 5 Topic Essay - Hid omnikey 5427 ck configuration - Diamond python life cycle - What is okonkwo's tragic flaw - 700 word discussion: According to Shneiderman and Bederson (2003),With this revelation in mind, identify, and discuss the benefits? - PAD 520 Learning Activity: Monitoring Observed Policy Outcomes - Discussion - Solidworks flow simulation add heat source - Formative assessment strategies ppt - Manipulating NumPy Arrays - Wheller gardens emmaus village - Rlcis ob & ib fund - Southern cross school of distance education ballina - Southern cross school of distance education - REP 2 - Who does atticus think killed bob - ISACs - Prologue of romeo and juliet - Leopold maneuver steps ati - Ray cupple bought a basic car costing - Online discussion forum - What is “FOOTPRINTING” (or digital reconnaissance) is and how you would go about gathering the information you need to determine the location of a recently stolen late model car that was last seen in the parking lot of our college. - Zig zag line on the periodic table - Why should the wavelength scale of the spectroscope be calibrated - The following balances were taken from the books of alonzo corp. on december 31, 2017. - Starbucks employee training - Why america is self segregating they say i say - Khana khazana catering blackburn - Poetic techniques and examples - Org and beha - 03.05 media and politics assessment - Safety hazard symbol worksheet answers - MGT317 Week-5 Final Exam score 87% - Bartley barstools has an equity multiplier of - Risk based thinking ppt - Painting double hung windows - Cystoscopy urethral dilation and hydrodilation - Aged care police clearance - What is the zeroth law of robotics - Liriope stripey white bunnings - Bus 475 capstone final examination part 2 answers