ProductsLogo
LogoStudy Documents
LogoAI Grader
LogoAI Answer
LogoAI Code Checker
LogoPlagiarism Checker
LogoAI Paraphraser
LogoAI Quiz
LogoAI Detector
PricingBlogAbout Us
logo

Analysis of Network Security Tools: Nessus and Nmap

Verified

Added on  2024/05/29

|17
|1294
|337
AI Summary
This document provides an in-depth analysis of two popular network security tools: Nessus and Nmap. It explores their features, working mechanisms, and key differences. The document also presents a case scenario involving an educational institute, UVW, highlighting the security requirements and how Nessus can effectively address them. The analysis concludes by emphasizing the importance of vulnerability scanners in safeguarding network security and the ongoing competition between Nessus and Nmap.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
ANALYSIS OF NETWORK SECURITY TOOLS
Network security referred as policies and practices adopt to avoid and
supervise unauthorized access, misuse, modification, or rejection of a
computer network and network-accessible possessions.

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Nessus
Nessus is proprietary, vulnerability scanner.
It is free of cost for personal employ.
Vulnerability scanner is a scanner which is use
to discover weak points and poorly constructed
path.
Nessus allows scans for following vulnerability:
Misconfiguration
Common passwords, default passwords
and blank spaces.
Denial of service
Preparation of Data Security Standards
audits.
Document Page
FEATURES OF NESSUS
Following are the features of Nessus:
Up-to-date security database: database security is high and updated.
Scalable: Nessus is scalable that means can exploit the strength of the
system, so the scanning of this software is efficient.
Multiple services: Multiple services can be run by a host.
Remote and local security: Remote and local security is provided by the
Nessus.
Plug-ins: For every security test, there is a plug-ins which is written in
NASL.
NASL: NASL stands for Nessus Attack Scripting Language, it’s language
designed for the security test.
Non-destructive audits: Nessus allows to perform the non- destructive
security audit on the daily basis or periodically.
Document Page
WORKING OF NESSUS
1. Configure and use nessus: This
first step we will configure the
nessus which follow the
installation wizard. We wills
create the administration user
account and activate the account
with the activation code.
2. This is the basic operation of the
nessus such as we will provide the
name and visibility. Description is
also given if necessary.

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
WORKING OF NESSUS
(contd…)
3. This will show the scan audits of the
application. The advantage of scan
audit is that all the data it achieved at
the one time.
4. In the 4th image, all the scans are
displayed on the screen. Then the test
is applied to the scans for the efficient
result.
Document Page
WORKING OF NESSUS
(contd…)
5. Running process will be displayed
like this on the screen. Vulnerabilities
can be viewed.
6. At the last the status report is
displayed, which tells us about the
final attacks and vulnerabilities in the
network.
Document Page
NMAP
Nmap is a free security scanner.
Used to determine hosts & services on computer
network.
We can see Nmap as building a ‘map’ on the
compute network.
To analyze the response, crafted packets are send
to the hosts.
Nmap is started for the Linux only, but now it is
ported to windows, Solaris and many other
platforms.
Nmap can adjust to various network conditions
with latency & congestion during a scan.
It continues to extend and improve the tool
periodically.

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
FEATURES OF NMAP
Following are the features of nmap:
Host discovery: host is discovered in
the host discovery features.
Port Scanning: Identifying the open
ports on target has.
OS detection: OS detection determine
the operation system in addition with
hardware characteristics of the
computing and network device.
Version detection: It is used to discover
the name of the application and the
number of the version.
Document Page
WORKING
1. Enter the target to 127.0.0.1 or
any other port and profile to
intense scan, then click to scan.
The result will be Nmap output.
Like displayed in the picture.
2. post/host will be displayed. This will
show the port as well as services.
Document Page
WORKING
(contd..)
3. Topology shows the route for the
scan .
4. Host details shows a outline of the
target through scans, such as the port
number, IP address, host name, OS,
and many more.

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
WORKING (contd..)
5. Scan tab keep the commands of
lastly run scans. This allows quickly re-
scan with a definite set of parameters.
Document Page
NESSUS AND NMAP DIVERGENCE
Nessus
Security features-
-> It uses plug-ins to provide
the security and its
management.
-> Real attacks are
performed and report is
given for these attacks.
-> Prevent intrusion and
DOS(denial of service).
Nmap
Security features-
-> Unauthorized connected
device can be detected.
-> Detect the device with
open port which is not
open.
-> Detect the unauthorized
user which is accessing the
services
Document Page
NESSUS AND NMAP DIVERGENCE
Nessus
Time taken to detect: The
detection time of the
NESSUS is less than NMAP
because there are no such
test like NMAP. The result is
not efficient.
Ease of usage: This software
is user-friendly and easy to
use.
Nmap
Time taken to detect: The
detection time of the NMAP
is higher because ten
different tests are done and
then the result of all tests are
compared. Output is efficient.
Ease of usage: This software
is little complex because
number of tests are
attempted.

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
CASE SCENERIO
UVW is an educational institute. Following are the business requirement in the
terms of security:
-> Individual server authentication is required.
-> confidential data should not be leak
-> Each user should have authorized permission
-> Cryptography technique should be used so that data should be transmitted
without leakage
-> Multiple services by single host so that cost can be minimized.
Different security threats in UVW are:
-> DoS (denial of service)
-> Malware
-> Social engineering
Document Page
CASE SCENERIO (contd..)
I selected Nessus tool for this scenerio.
Following are the reason to select this tool:
-> Nessus provide multiple services.
-> It provides the plug-ins for each test and manages the
attack efficiently.
-> Audit is done periodically or even on daily basis.
-> Network list, network mapping, and maintenance is
done efficiently.
Document Page
CONCLUSION
To conclude, would like to say that Vulnerability scanners are
very essential for the network security.
Competition between Nessus and Nmap keep persist
nowadays.
NMAP & NESSUS both are highly secured scanner tool.
Due to different features which the software's providing, the
popularity is increasing.
NMAP & NESSUS both are highly secured scanner tool.
NMAP or NESSUS helps to protect weak components known
attack by intercepting them before they reach their
destination.

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
REFERENCES
J. kizza, 2009. [Online]. Available:
https://www.researchgate.net/publication/253687458_A_Guide_to_Computer_N
etwork_Security. [Accessed: 04- May- 2018].
W. simons, Dc.etsu.edu, 2005. [Online]. Available:
https://dc.etsu.edu/cgi/viewcontent.cgi?article=2144&context=etd. [Accessed: 04-
May- 2018].
t. attar, "A CASE STUDY ON NMAP -NETWORK MAPPER", Academia. [Online].
Available: https://www.academia.edu/34856706/A_CASE_STUDY_ON_NMAP_-
NETWORK_MAPPER?ends_sutd_reg_path=true. [Accessed: 04- May- 2018].
P. Certification, "3 Common Network Security Threats | 3 Common Network
Security Threats | Pearson IT Certification", Pearsonitcertification, 2016. [Online].
Available: http://www.pearsonitcertification.com/articles/article.aspx?p=2491768.
[Accessed: 04- May- 2018].
1 out of 17
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]