logo

Analysis of Network Security Tools: Nessus and Nmap

   

Added on  2024-05-29

17 Pages1294 Words337 Views
 | 
 | 
 | 
ANALYSIS OF NETWORK SECURITY TOOLS
Network security referred as policies and practices adopt to avoid and
supervise unauthorized access, misuse, modification, or rejection of a
computer network and network-accessible possessions.
Analysis of Network Security Tools: Nessus and Nmap_1

Nessus
Nessus is proprietary, vulnerability scanner.
It is free of cost for personal employ.
Vulnerability scanner is a scanner which is use
to discover weak points and poorly constructed
path.
Nessus allows scans for following vulnerability:
Misconfiguration
Common passwords, default passwords
and blank spaces.
Denial of service
Preparation of Data Security Standards
audits.
Analysis of Network Security Tools: Nessus and Nmap_2

FEATURES OF NESSUS
Following are the features of Nessus:
Up-to-date security database: database security is high and updated.
Scalable: Nessus is scalable that means can exploit the strength of the
system, so the scanning of this software is efficient.
Multiple services: Multiple services can be run by a host.
Remote and local security: Remote and local security is provided by the
Nessus.
Plug-ins: For every security test, there is a plug-ins which is written in
NASL.
NASL: NASL stands for Nessus Attack Scripting Language, it’s language
designed for the security test.
Non-destructive audits: Nessus allows to perform the non- destructive
security audit on the daily basis or periodically.
Analysis of Network Security Tools: Nessus and Nmap_3

WORKING OF NESSUS
1. Configure and use nessus: This
first step we will configure the
nessus which follow the
installation wizard. We wills
create the administration user
account and activate the account
with the activation code.
2. This is the basic operation of the
nessus such as we will provide the
name and visibility. Description is
also given if necessary.
Analysis of Network Security Tools: Nessus and Nmap_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
ICT287 Computer Security: Planet of the Grapes
|14
|2703
|84

Penetration Testing Report 2022
|23
|1237
|18

Penetration Testing and Intrusion Detection Name of the University Author
|57
|5094
|316

Overview of Network Security
|11
|1474
|434

Firewall and Configuration Report 2022
|22
|1741
|23

Conducting Vulnerability on Windows XP-SP2 System using Nessus and Metasploit
|42
|2354
|77