Network Analyzer Report: University Network Security Tools

Verified

Added on  2021/06/14

|23
|1414
|31
Report
AI Summary
This report provides an overview of network security tools, focusing on Nessus and Nmap. It details the download and installation processes for both tools, followed by descriptions of their functionalities. Nessus is presented as a vulnerability scanner, utilizing tools like Nikto and Hydra, while Nmap is described as a network mapper, using tools like Nping, Ndiff, and Ncat. The report compares the two tools, highlighting Nessus's role in detecting vulnerabilities and Nmap's function in mapping network locations. An analysis of a scenario involving misuse of a classroom network is also included, discussing potential security threats and recommending solutions such as blocking inappropriate sites and installing firewalls. The report concludes with a bibliography of relevant sources.
Document Page
Running head: NETWORK ANALYZER
Network Analyzer
Name of the student:
Name of the University:
Author Note
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1
NETWORK ANALYZER
1. Download and Installation of the Security Tools
For the report the two tools selected are Nessus and Nmap.
The downloading and installation process of the tools are provided in this section of the report.
Nessus
Download
Document Page
2
NETWORK ANALYZER
Document Page
3
NETWORK ANALYZER
Installation
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4
NETWORK ANALYZER
Document Page
5
NETWORK ANALYZER
Document Page
6
NETWORK ANALYZER
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7
NETWORK ANALYZER
Document Page
8
NETWORK ANALYZER
Document Page
9
NETWORK ANALYZER
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
10
NETWORK ANALYZER
Document Page
11
NETWORK ANALYZER
Nmap
Download
Document Page
12
NETWORK ANALYZER
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
13
NETWORK ANALYZER
Installation
Document Page
14
NETWORK ANALYZER
Document Page
15
NETWORK ANALYZER
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
16
NETWORK ANALYZER
Document Page
17
NETWORK ANALYZER
Document Page
18
NETWORK ANALYZER
2. Description of the Security Tools
Nessus: Nessus is defined as an open source networking system that is vulnerable in nature. This
fact ensures the fact that the data that is stored in the vulnerability of the easy crossing links. This
ensures the fact that the Nessus Attack Scripting ensures the fact that the data that is stored stays
protected in the performing the security of the data layers that are possessed with the threats of
the administrator interaction. The administration includes the Nessus Attack Scripting language.
This feature enables the factor that the data stays protected and is also used for the description of
the potential attacks that might harm the modular architecture.
Nmap: Network Mapper has been acting as the security issue that tends to improve with the
finicality of pseudonym Fyodor. This technology takes into use the factor of the GPS system that
tracks the host and the server of the networking system. The data of the location that is collected
with the help of this tracking of the hosts and the server, the Network Mapper plots the design of
the networking system. The design that is plotted by the Network Mapper insists on performing
the procession of the data and plotting of the hosts and the servers provides the infrastructure
map for the appliance. This feature helps in providing the tendency to track the potential threats
that can harm the infrastructure of the system.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
19
NETWORK ANALYZER
3. Demonstration of Security Tools
Nessus: Nessus takes into consideration the fact that the security system uses two tools for the
completion of the data in case of the processing of the security purposes. Nikto acts as the major
tool that enables the functioning of the security system of the Nessus. Nikto is a web application
tool that ensures the fact that the misconfiguration in the processing of the infrastructure is
searched and found. This enables the fact that the data that is suffering from the misconfiguration
is protected by repairing the infrastructure. Hydra is also used for the benefit of the infrastructure
as Hydra is already installed in the system path, which means it is available to Nessus "out-of-
the-box" in BackTrack 5.
Nmap: Nping is a major tool that is used in the processing of the functioning of the Nmap. This
is used for the purpose of generating tool packages. Ndiff also acts as a tool of the Nmap as it
functions in the comparison of the data that are collected from the platform of Nmap. Ncat also
acts as an important tool for the Nmap services as the task of Ncat is to differentiate and the
concatenate the data that is collected by the Nmap.
4. Comparison of the Tools
Nessus is mainly treated as the vulnerability scanner whereas in other hand the NMAP is
basically used for the purpose of the detecting the location of the hosts and the servers. The
major function of the Nessus is to detect the vulnerability that will act as the threat to the
infrastructure. In case of the Nmap the major issue is that the mapping of the location of the
hosts and the servers. Nessus ensures the fact that it notifies the vulnerabilities that are required
for the processing of the vulnerabilities in the processing of the data security facility amid detects
the ports which are possessing the threat to get attacked and the reports are monitored carefully.
In case of the Nmap the only task is to locate the ports of the framework. Nessus is installed in a
Document Page
20
NETWORK ANALYZER
server and the functioning of the details done with the help of the web-based application.
Whereas in case of Nmap after scanning of the entire infrastructure.
The selected tool that finds its use in the security of the progression of the infrastructure is the
Nessus. The Nessus is used for predicting the areas that might get attacked due to the increased
vulnerability of the framework. This fact ensures that the framework of the networking system is
granted the positioning of the port. This process ensures the fact that the framework stays
protected from any kind of problems. In case of the NMap the major task is to ensure the
tracking of the data regarding the host and the server of the system. This ensures the fact that the
NMap deals with the processing of the mapping of the prosecution. This is the reason why
Nessus is used for the security purpose over NMap.
Analysis of the provided scenario
Due to the fact that the network that has provided the terminology for the connectivity in the
classroom is used wrongly by the students. This misuse of the technology includes the fact that
tehb students have been connecting with their friends during the class hours which is leading to
appraisal of misconduct in the time of studying and the technology is misused by the students.
The evolved technology, which was built for increasing the proficiency of the studying of the
students, was used in the sense that harmed the carriers of the student. Despite the concerns
regarding the carrier of the students and the maintenance of the decorum of the school the major
concern lies in the form of data security of the organization. The cyber criminals who are
intending to get access to the data base if the organization can easily get access through the
networking system that was available for the access to the data center of the organization. The
imposter can get the IP address of server of the organization and gain unauthorized access to the
data center. This fact ensures that the data that is stored in the data center of the database can be
Document Page
21
NETWORK ANALYZER
accessed easily and the desired modulations can be brought into the service of the system. the
best way to stop this security issues is by blocking the sites that do not bother the aim of the
organization as well as the carrier of the organization. Installation of firewall also acts to be a
helpful way to stop this unauthorized access to the data.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
22
NETWORK ANALYZER
Bibliography
[1] Antrobus, R., Frey, S., Green, B. and Rashid, A., August. Simaticscan: Towards a specialised
vulnerability scanner for industrial control systems. BCS, 2016.
[2] Arambatzis, T., Lazaridis, I. and Pouros, S., May. Modern Windows Server Operating
Systems Vulnerabilities. In The Third International Conference on Computer Science, Computer
Engineering, and Social Media (CSCESM2016) (p. 29),2016.
[3] Calderon, P. Nmap: Network Exploration and Security Auditing Cookbook. Packt Publishing
Ltd, 2017.
[4] Coffey, K., Smith, R., Maglaras, L. and Janicke, H. Vulnerability Analysis of Network
Scanning on SCADA Systems. Security and Communication Networks, 2018.
[5] Fifield, D., Geana, A., MartinGarcia, L., Morbitzer, M. and Tygar, J.D. October. Remote
operating system classification over IPv6. In Proceedings of the 8th ACM Workshop on Artificial
Intelligence and Security (pp. 57-67). ACM, 2015.
[6] Genge, B. and Enăchescu, C. ShoVAT: Shodanbased vulnerability assessment tool for
Internetfacing services. Security and communication networks, 9(15), pp.2696-2714, 2016.
[7] Helms, J., Salazar, B., Scheibel, P., Engels, M. and Reiger, C. Safe Active Scanning for
Energy Delivery Systems Final Report (No. LLNL-TR-740556). Lawrence Livermore National
Lab.(LLNL), Livermore, CA (United States), 2017.
chevron_up_icon
1 out of 23
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]