preview

Nt2580 Unit 7 Chapter 12

Decent Essays

In this module 7, I learn Chapter 12 and Chapter 13 I have very wide knowledge about following subjects.
A vulnerability assessment is a risk testing process which finds, quantity and rank possible vulnerabilities to threats in as many security defects as possible in a given timeframe. Depend upon organization scope there are many way to conduct vulnerability assessment. This assessment may involve automated and manual techniques.
Following three major steps are conducting an assessment:
Conduct Assessment: In this step, planning component and gathering all relevant information, such as defining the scope of activities, defining roles and responsibilities and making others aware process.
Address Exposures: In this step, reviewing final collected …show more content…

uses to Trusted Computer Bases (TCBs). Here are C1 and C2 sub division. C1 - Discretionary Security Protection: In this sub division Access Control Lists (ACLs) security which protect User/Group/World. Security will protect following Users who are all on the same security level, Username and Password protection and secure authorisations database (ADB), Protected operating system and system operations mode, Periodic integrity checking of TCB, Tested security mechanisms with no obvious bypasses, Documentation for User Security, Documentation for Systems Administration Security, Documentation for Security Testing, TCB design documentation and Typically for users on the same security level. C2 - Controlled Access Protection: In this sub division similarity protect like C1 but following are the extra protected by this C2: Object protection can be on a single-user basis, Authorization for access may only be assigned by authorized users, Object reuse protection, Mandatory identification and authorization procedures for users, Full auditing of security events, Protected system mode of operation and Added protection for authorization and audit

Get Access