Security Assessment Report: Operating Systems Vulnerabilities Analysis

Verified

Added on  2022/09/01

|15
|544
|34
Report
AI Summary
This report presents a cybersecurity assessment of a company's IT infrastructure, focusing on vulnerabilities in Windows and Linux operating systems. The assessment was prompted by recent incidents, including database server crashes and unauthorized configuration changes. The report details technical findings from vulnerability scans using MBSA and OpenVAS, identifying high, medium, and low severity risks. The most serious risks include administrative vulnerabilities and weak passwords. The report outlines the impact of these vulnerabilities on business operations and employees, emphasizing the need for a strong organizational management plan, new workplace policies, and proactive responses to security threats. Recommendations include implementing a risk management plan, enforcing security measures, and continuously monitoring and maintaining security protocols to mitigate identified risks and ensure data protection.
Document Page
CYBERSPACE
&
CYBERSECURITY FOUNDATIONS
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
2
STEP 6:
DEVELOP THE
PRESENTATION
Document Page
3
OVERVIEW
In last two months, the lead cybersecurity engineer
has encountered crashing of three corporate database
servers.
Identified some anomalies in certain server and router
system’s configuration.
It is suspected that someone is regularly accessing the
company’s user account and
performing configuration modifications illegally.
Thus, security assessment report was provided.
Document Page
4
REASON FOR SECURITY REVIEW
The lead cybersecurity engineer has observed several
anomalies and incidents, which are directing towards
security breaches.
However, it is still not determined whether the
incidents are taken place by a single or multiple
sources.
As per the lead cybersecurity engineer’s expertise
immediate assessing and approrpriate actions are
essential.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
WORKSPACE
EXERCISE
REPORT
E x t r a c t e d R e s u l t s
5
Document Page
TECHNICAL FINDINGS
The organization comprises of Windows and Linux operating systems.
Thus, the vulnerability assessment tools used includes Microsoft
Baseline Security Analyzer (MBSA) and OpenVAS, respectively.
All the computers are scanned using these tools, to determine the
vulnerabilities.
6
Document Page
RESULTS
The results show high, medium and low rated severity vulnerabilities.
The problem identified by the MBSA tool can be resolve the
vulnerabilities by ensuring Microsoft updates for the computers.
The problem identified by the OpenVAS for the Linux machines can be
resolved by improving administrative procedure and implement strong
passwords.
7
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
M O S T S E R I O U S R I S K S
8
Document Page
SERIOUS RISKS
In MSBA and Open Vas, administrative risk is the most serious risk that
is encountered from the results.
The other risk includes weak password on Windows accounts.
These are common risks which can be mitigated easily with the
implementation of risk analysis and risk management.
However, it is required to implement certain policies and procedures to
discard the risks.
Implementing security rules can be helpful.
9
Document Page
H O W W O R K S PA C E
E X E RC I S E R E S U LT S
AF F E C T B U S I N E S S
O P E RAT I O N S ?
10
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
11
IMPACT ON BUSINESS
OPERATIONS
The business process will be
changed.
It will improve the security in all the
stages.
It will avoid the attackers to harm the
company’s data.
Allows smooth functioning.
IMPACT ON
EMPLOYEES
The employees’ data will be
protected and avoid them to fall into
serious conditions.
Allows taking precautionary
measures or instructions to have a
strong password.
Document Page
R E C O M M E N D AT I O N S
12
chevron_up_icon
1 out of 15
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]