Security Assessment Report: Operating Systems Vulnerabilities Analysis

Verified

Added on  2022/09/01

|15
|544
|34
Report
AI Summary
This report presents a cybersecurity assessment of a company's IT infrastructure, focusing on vulnerabilities in Windows and Linux operating systems. The assessment was prompted by recent incidents, including database server crashes and unauthorized configuration changes. The report details technical findings from vulnerability scans using MBSA and OpenVAS, identifying high, medium, and low severity risks. The most serious risks include administrative vulnerabilities and weak passwords. The report outlines the impact of these vulnerabilities on business operations and employees, emphasizing the need for a strong organizational management plan, new workplace policies, and proactive responses to security threats. Recommendations include implementing a risk management plan, enforcing security measures, and continuously monitoring and maintaining security protocols to mitigate identified risks and ensure data protection.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
CYBERSPACE
&
CYBERSECURITY FOUNDATIONS
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
2
STEP 6:
DEVELOP THE
PRESENTATION
Document Page
3
OVERVIEW
In last two months, the lead cybersecurity engineer
has encountered crashing of three corporate database
servers.
Identified some anomalies in certain server and router
system’s configuration.
It is suspected that someone is regularly accessing the
company’s user account and
performing configuration modifications illegally.
Thus, security assessment report was provided.
Document Page
4
REASON FOR SECURITY REVIEW
The lead cybersecurity engineer has observed several
anomalies and incidents, which are directing towards
security breaches.
However, it is still not determined whether the
incidents are taken place by a single or multiple
sources.
As per the lead cybersecurity engineer’s expertise
immediate assessing and approrpriate actions are
essential.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
WORKSPACE
EXERCISE
REPORT
E x t r a c t e d R e s u l t s
5
Document Page
TECHNICAL FINDINGS
The organization comprises of Windows and Linux operating systems.
Thus, the vulnerability assessment tools used includes Microsoft
Baseline Security Analyzer (MBSA) and OpenVAS, respectively.
All the computers are scanned using these tools, to determine the
vulnerabilities.
6
Document Page
RESULTS
The results show high, medium and low rated severity vulnerabilities.
The problem identified by the MBSA tool can be resolve the
vulnerabilities by ensuring Microsoft updates for the computers.
The problem identified by the OpenVAS for the Linux machines can be
resolved by improving administrative procedure and implement strong
passwords.
7
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
M O S T S E R I O U S R I S K S
8
Document Page
SERIOUS RISKS
In MSBA and Open Vas, administrative risk is the most serious risk that
is encountered from the results.
The other risk includes weak password on Windows accounts.
These are common risks which can be mitigated easily with the
implementation of risk analysis and risk management.
However, it is required to implement certain policies and procedures to
discard the risks.
Implementing security rules can be helpful.
9
Document Page
H O W W O R K S PA C E
E X E RC I S E R E S U LT S
AF F E C T B U S I N E S S
O P E RAT I O N S ?
10
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
11
IMPACT ON BUSINESS
OPERATIONS
The business process will be
changed.
It will improve the security in all the
stages.
It will avoid the attackers to harm the
company’s data.
Allows smooth functioning.
IMPACT ON
EMPLOYEES
The employees’ data will be
protected and avoid them to fall into
serious conditions.
Allows taking precautionary
measures or instructions to have a
strong password.
Document Page
R E C O M M E N D AT I O N S
12
Document Page
RECOMMENDATIONS
Propose a plan for organizational management.
The plan must concentrate on administrative risk control.
Create new workplace policies
New procedures that must be practiced for decreasing the employee’s
exposure to risk conditions.
Take immediate actions when any unauthorized action is suspected or
vulnerabilities are encountered.
Development and implementation of risk management plan.
Implementation of security measures.
Evaluating and maintaining security measures.
13
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
CONCLUSION
It is concluded that an effective organizational management plan
containing risk management is required for the company to discard the
administrative risks. The organization must work on new workplace
policies, and procedures.
There must not be any delay when any form of unauthorized activity is
suspected.
The security measures must be monitored, strengthened and maintained.
14
Document Page
THANK YOU
15
chevron_up_icon
1 out of 15
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]