1,628
4
Essay, 3 pages (550 words)

Example of essay on cyber security

An important aspect of server security is being proactive about security screening. Anyone who is exposed to any services on the internet, penetration testing is an important task to ensure threat vulnerability (Digitalocean. com, 2014). There are many ways of performing this test, and one of the best ways is via OpenVAS (Openvas. org, 2014).
OpenVAS is the evolved from a project called Nessus, which became a proprietary tool. The security scanner is accompanied by Network Vulnerability Tests (NVTs) daily. The Open Vulnerability Assessment System (OpenVAS) was developed to allow free development of the vulnerability scanner since Nessus had become a paid-for subscription service.
OpenVAS is one of the top five tools for network assessment. OpenVAS is the world’s most advanced Open Source vulnerability scanner (Phatak, 2012). The scanner is 100% free and is based on and Open Source Software. It is a process to measure the IT threats of an infrastructure, identify them, classify and fix/mitigate then in a 3 tier scalable architecture on a day to day basis (Online Vulnerability Scanners and Port Scans, 2012).
OpenVAS is divided into two major components — a scanner and a manager. The scanner may exist on the target to be scanned and the feed vulnerability findings are fed to the manager. The manager then collects inputs from various scanners, applies its own intelligence logic to create a report (Sectools. org, 2014).
OpenVAS performs both authenticated and unauthenticated tests. The authenticated tests are local Security Checks (LSC). These tests are used for information gathering, configuration correctness (over SSH, over SMB/WMI), and missing updates/patches. The unauthenticated checks include network scanning, web applications audits and credentials brute force

OpenVAS uses and relies upon various standards listed below

– Common Vulnerability Enumeration
– Common Platform Enumeration
– Common Vulnerability Scoring System
– Open Vulnerability and Assessment Language
– IT-Grundschutz (YouTube, 2014)

Many times OpenVAS is misunderstood as an automated pentester or an attack tool or fix for vulnerable systems.

Following are aims of using OpenVAS
– Detect insecure configurations
– Check for compliance with your security policy – Harden both the exposed perimeter and the core of the network.
In the world of security OpenVAS is trusted as very stable and reliable way for detecting security loopholes, and for providing inputs to fix them (Greenbone. net, 2014). Creating detailed reports is one thing that makes OpenVAS a tool favored by infrastructure security managers (Doreau, 2011).

References

Digitalocean. com,. (2014). How To Use OpenVAS to Audit the Security of Remote Systems on Ubuntu 12. 04 | DigitalOcean. Retrieved 19 October 2014, from https://www. digitalocean. com/community/tutorials/how-to-use-openvas-to-audit-the-security-of-remote-systems-on-ubuntu-12-04
Doreau, H. (2011). Vulnerability management with OpenVAS (1st ed.). Retrieved from http://2011. rmll. info/IMG/pdf/5-Henri-OpenVAS-RMLL2011. pdf
Greenbone. net,. (2014). Greenbone: FAQ. Retrieved 19 October 2014, from http://www. greenbone. net/learningcenter/faq. html
Openvas. org,. (2014). OpenVAS Manager: Main Page. Retrieved 19 October 2014, from http://www. openvas. org/src-doc/openvas-manager-5. 0. 4/index. html#Introduction
Dalziel, H. (2014). OpenVAS Tutorial (Vulnerability Assessment) and summary of framework. Concise-courses. com. Retrieved 19 October 2014, from http://www. concise-courses. com/security/openvas-tutorial/
Sectools. org,. (2014). OpenVAS – SecTools Top Network Security Tools. Retrieved 19 October 2014, from http://sectools. org/tool/openvas/
YouTube,. (2014). Setting up OpenVAS on Kali Linux + Config and Scanning Howto + Free Startup Script. Retrieved 19 October 2014, from https://www. youtube. com/watch? v= 0b4SVyP0IqI
Online Vulnerability Scanners and Port Scans,. (2012). 10 Essential Open Source Security Tools | HackerTarget. com. Retrieved 19 October 2014, from http://hackertarget. com/10-open-source-security-tools/
Computerweekly. com,. (2014). OpenVAS how-to: Creating a vulnerability assessment report. Retrieved 19 October 2014, from http://www. computerweekly. com/tip/OpenVAS-how-to-Creating-a-vulnerability-assessment-report
Phatak, P. (2012). Top 10 Security Assessment Tools – Open Source For You. Open Source For You. Retrieved 19 October 2014, from http://www. opensourceforu. com/2012/02/top-10-security-assessment-tools/

Thank's for Your Vote!
Example of essay on cyber security. Page 1
Example of essay on cyber security. Page 2
Example of essay on cyber security. Page 3
Example of essay on cyber security. Page 4
Example of essay on cyber security. Page 5

This work, titled "Example of essay on cyber security" was written and willingly shared by a fellow student. This sample can be utilized as a research and reference resource to aid in the writing of your own work. Any use of the work that does not include an appropriate citation is banned.

If you are the owner of this work and don’t want it to be published on AssignBuster, request its removal.

Request Removal
Cite this Essay

References

AssignBuster. (2022) 'Example of essay on cyber security'. 19 September.

Reference

AssignBuster. (2022, September 19). Example of essay on cyber security. Retrieved from https://assignbuster.com/example-of-essay-on-cyber-security/

References

AssignBuster. 2022. "Example of essay on cyber security." September 19, 2022. https://assignbuster.com/example-of-essay-on-cyber-security/.

1. AssignBuster. "Example of essay on cyber security." September 19, 2022. https://assignbuster.com/example-of-essay-on-cyber-security/.


Bibliography


AssignBuster. "Example of essay on cyber security." September 19, 2022. https://assignbuster.com/example-of-essay-on-cyber-security/.

Work Cited

"Example of essay on cyber security." AssignBuster, 19 Sept. 2022, assignbuster.com/example-of-essay-on-cyber-security/.

Get in Touch

Please, let us know if you have any ideas on improving Example of essay on cyber security, or our service. We will be happy to hear what you think: [email protected]