network

Attacker Rony installed a rogue access point within the organization’s perimeter and attempted to intrude into its internal network. Johnson, a security auditor, identified some unusual traffic in the internal network that is aimed at cracking the authentication mechanism. He immediately turned off the targeted network and tested for any weak and outdated security mechanism that are open to attack. What is type of vulnerability assessment performed by johnson in the above scenario?

Attacker Rony installed a rogue access point within the organization’s perimeter and attempted to intrude into its internal network. Johnson, a security auditor, identified some unusual traffic in the internal network that is aimed at cracking the authentication mechanism. He immediately turned off the targeted network and tested for any weak and outdated security mechanism that are open to attack. What is type of vulnerability assessment performed by johnson in the above scenario?

Option 1 : Wireless network assessment
Option 2 : Application assessment
Option 3 : Distribution assessment
Option 4 : Host-based assessment
1. Wireless network assessment

Expanding your network capabilities are often done well using wireless networks, but it also can be a source of harm to your data system . Deficiencies in its implementations or configurations can allow tip to be accessed in an unauthorized manner.This makes it imperative to closely monitor your wireless network while also conducting periodic Wireless Network assessment.
It identifies flaws and provides an unadulterated view of exactly how vulnerable your systems are to malicious and unauthorized accesses.
Identifying misconfigurations and inconsistencies in wireless implementations and rogue access points can improve your security posture and achieve compliance with regulatory frameworks.

2. Application assessment

Set up indicators to live the usability, cost, quality, performance, and risk of applications. Evaluate and score your business applications supported qualitative inputs. you’ll translate abstract information of applications supported surveys and assessments into more tangible concrete metrics. These assessments assist you make strategic decisions on whether to exchange or upgrade applications.

3. Distribution assessment

Assessments of the distributors are undertaken by a mixture of qualitative and quantitative methods. In summary the assessment involves the following:

• Visit to Distributor Head Office
  • Detailed discussions with Distributor Senior Management
  • Discussions with Operational Management
  • Trade visits with Distributor Representatives
Overview of the Enchange Distributor Assessment

Enchange has developed a Distributor Assessment Tool that assesses distributor performance and benchmarks them to international best practice standards as follows:
• Performance Categories. The Enchange Assessment Tool are going to be adapted for every client and can qualify to 10 categories. Under each category, there are a minimum of 10 specific factors that the tool rates to work out overall scores for the distributor.
• Performance Bands – we then categorise each distributor into levels of performance supported the Distributor Assessment tool adapted for the client – for instance , BRONZE (Basic), SILVER (Intermediate) and GOLD (Leading Edge), the latter being a real Partnership Distributor where all partners (particularly sales staff) within the business participate in collaborative strategic, tactical and operational planning and execution, reliable KPI data drives operational deciding , facilities are good quality, the organisation is capable of expansion and other people development, job satisfaction, Reward and Compensation are priorities.
• Distributor Development Plan. The assessment are going to be used because the basis for developing a bespoke Development Plan for every client distributor.

4. Host-based assessment

The host-based vulnerability assessment (VA) solution arose from the auditors’ got to periodically review systems. Arising before the web becoming popular, these tools often take an “administrator’s eye” view of the environment by evaluating all of the knowledge that an administrator has at his or her disposal. Uses Host VA tools check out system configurations, user directories, file systems, registry settings, and every one kinds of other information on a number to realize knowledge about it. Then, it evaluates the likelihood of compromise. it’s going to also measure compliance to a predefined corporate policy so as to satisfy an annual audit. With administrator access, the scans are less likely to disrupt normal operations since the software has the access it must see into the complete configuration of the system. What it Measures Host VA tools can examine the native configuration tables and registries to spot not only apparent vulnerabilities, but also “dormant” vulnerabilities – those weak or misconfigured systems and settings which will be exploited after an initial entry into the environment. Host VA solutions can evaluate the safety settings of a user account table; the access control lists related to sensitive files or data; and specific levels of trust applied to other systems. The host VA solution can more accurately determine the extent of the danger by determining how far any particular exploit could also be ready to get.

Learn CEH & Think like hacker


This Blog Article is posted by

Infosavvy, 2nd Floor, Sai Niketan, Chandavalkar Road Opp. Gora Gandhi Hotel, Above Jumbo King, beside Speakwell Institute, Borivali West, Mumbai, Maharashtra 400092

Contact us – www.info-savvy.com

https://g.co/kgs/ttqPpZ

Leave a Comment