Nessus Vulnerability Scan

Slides:



Advertisements
Similar presentations
By Bruce Ellis Western Governors University. Demonstrate the need for updating information systems Build security awareness Inform management of the risk.
Advertisements

MOBILE DEVICES & THEIR IMPACT IN THE ENTERPRISE Michael Balik Assistant Director of Technology Perkiomen Valley School District.
OneDrive for Business Introduction First Time Use First Time Use Access from Computer Access from Computer Access from Internet Access from Internet Access.
Ethical Hacking Introduction.  What is Ethical Hacking?  Types of Ethical Hacking  Responsibilities of a ethical hacker  Customer Expectations  Skills.
16254_08_2002 © 2002, Cisco Systems, Inc. All rights reserved. Cisco’s Security Vision Mario Mazzola Chief Development Officer August 29, 2002.
CSCI 530L Vulnerability Assessment. Process of identifying vulnerabilities that exist in a computer system Has many similarities to risk assessment Four.
Project Description The project basically consists of three main components-Attacker, Defender, and Observer. Our project scenario is the following: A.
One World Real Estate Company Technology Plan. New Computers For the Office Eight 13 inch MacBook Pros and three 27 inch iMac desktop computers Macs are.
Home and Learn How Setup a Wireless Internet Connection.
Introduction to Wireless Networking. Basic Wireless and Wired Network.
By: Matthew Follett. Introduction  A Wireless local area network (WLAN) links two or more devices using some wireless distribution method and usually.
Mobile Internet By Louise and Laura. Mobile Internet Traditionally, access to the Web has been via fixed- line services on laptops and desktop computers.
Lyndsey Naquin Tyler Pourciau Ryan Sandel Jessica Witcher.
The Internet. What is the internet? a vast network designed to transfer data from one computer to another.
MOBILE ACCESS TO THE INTERNET. Starter task In groups of 2 of 3, list as many mobile devices you can think of that can connect to the internet.
PROJECT PAPER ON BLUEFIRE MOBILE SECURITY. BY PONNURU VENKATA DINESH KUMAR STUDENT ID # A0815 PROFESSOR – VICKY HSU CS-426.
Ethical Hacking of Wireless Routers Faizan Zahid CS-340 Nida Noor CS-378.
Vulnerability Scan Assessment CS/IT 463 Bryan Dean Jonathan Ammons.
Peter Peerdeman Introduction Overview Wireless security Fon network Security scenarios Conclusion Wireless security Fon network Security.
AUSTRALIAN INVENTORS The Wireless Network project team CSIRO website – bibliography.
EdTech 541: Brian Hyatt. Share internet access File sharing Home gaming Sharing hardware
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRO TO THE MOBILE INTERNET.
Technology Trends and the Productivity Gains for Life Sciences Companies Randy Paroda, Director of Product Development September 17, 2013.
Texas Technology Forum The Future of Mobile Technology Trends and Issues July 16, 2009.
Ethical Hacking License to hack. OVERVIEW Ethical Hacking ? Why do ethical hackers hack? Ethical Hacking - Process Reporting Keeping It Legal.
Mobile Security By Jenish Jariwala. What is Mobile Security?  Mobile Security is the protection of smartphones, tablets, laptops and other portable computing.
Who We Are Improve internet accessibility – Within the dorms – Only 4 of 21 residence halls.
IT 463 – Scanning Assignment Shane Knisley Erik Bennett.
Technology Services. Technology Update WINSTON-SALEM/FORSYTH COUNTY SCHOOLS SEPTEMBER 2015.
Smart City Hacked??? Technology & Society. American cities vulnerable to large-scale cyber attack
OIT and IT providers across campus are launching an awareness campaign to provide tips and resources to help you stay safe online and protect AU resources.
A laptop is expensive. A mobile phone is expensive, too. Which is more expensive? A laptop is more expensive than a mobile phone. 123.
NESSUS. Nessus Vulnerability Scanner Features: Ease of use Deep Vulnerability Analysis Discover network based and local vulnerabilities Perform configuration.
Your Cyber Security: The scope of your risk is broad and growing To understand the nature of the risk landscape look at the presentations here today-begin.
BYOD: An IT Security Perspective. What is BYOD? Bring your own device - refers to the policy of permitting employees to bring personally owned mobile.
WIRELESS GATEWAYS FOR HOME USE AND ENTERPRISE USE NOR HANANI BINTI SAHARUDIN TSK 1.
Wi-Fi Brandon & Jiayang. What is Wi-Fi? Wi-Fi (wireless fidelity) is a wireless networking technology that allows devices to communicate without wires.
Nessus Scan exercise Arkadiy Kantor MIS5211.
Cisco's Assurance System
Guided and Unguided Media
Introduction Intro Problem Materials Hypothesis Procedure Results
Calvin Wilson Craig Delzangle
Introduction To Telecom
Internet-of-somewhat-dubious-Things
Nessus Vulnerability Scan
Nessus Vulnerability Scan Report
WHOIS ANALYSIS Reveals Domain ID information Headquarters location
Chapter 1: Exploring the Network
Acer Technical Support Number
33 Port Scanners (w/out major risk factor)
5 HACKS THAT WILL HELP YOU ACHIEVE YOUR MAJOR BEAUTY GOALS.
Issues with Your D-Link Router; Call D-Link Router Customer Support Number
Intro to Ethical Hacking
Intro to Ethical Hacking
Security of Handheld Devices
Analysis Report Kali Linux Metasploit
Network Models, Hardware, Protocols and number systems
Nessus Vulnerability Assessment
Metasploit Analysis Report Overview
BURP SUITE Analysis Philadelphia Gas Works(PGW)
Analyzing OS Sample Windows 7 image provided by different class
Get prepared – the workshop
Home and personal communication systems
Network Hardware and Protocols
Roberto Nogueda ITACS 5211: Introduction to Ethical Hacking
Intro to Ethical Hacking
Metasploit assignment – Arkadiy Kantor – Mis-5212
Using a Nessus Scanner on a
NESSUS SCANNING By: Vaibhav Shukla.
IP Addresses & Ports IP Addresses – identify a device on a network
Presentation transcript:

Nessus Vulnerability Scan Home network MIS 5211 Intro to Ethical Hacking Fall 2016 Wayne Wilson

Nessus Vulnerability Scan Network infrastructure 1 Wireless Router 2 Smart Televisions 2 Mobile Phones 3 laptops 1iPad MIS 5211 Intro to Ethical Hacking Fall 2016 Wayne Wilson

Nessus Vulnerability Scan Metasploitable (VM) 5 Critical Vulnerabilities 10 Mediums Vulnerabilities 4 Low Vulnerabilities 90 Informative Vulnerabilities MIS 5211 Intro to Ethical Hacking Fall 2016 Wayne Wilson

Nessus Vulnerability Scan Results from scan MIS 5211 Intro to Ethical Hacking Fall 2016 Wayne Wilson

Nessus Vulnerability Scan Conclusion IT security is more relevant Close open ports that are not needed. Securing and maintaining a company’s infrastructure Vigilant eye on your network. MIS 5211 Intro to Ethical Hacking Fall 2016 Wayne Wilson