Lab 5 Scanning and Remediating Vulnerabilities with OpenVAS

This lab gives us an overview of how to use software to perform a full system vulnerability check and try to fix this problems. Ans1 Investigate and discuss one of the SSL vulnerabilities found as a result of the OpenVAS scan that has a severity rating of 4 or higher. A severity rating of 4Continue reading “Lab 5 Scanning and Remediating Vulnerabilities with OpenVAS”

Lab 4: Network Vulnerabilities Part 2

Ans.1 Explain in your own words the DOS attack scenario. Denial of Service attacks (DOC) is a hacker using hacking software to denies service to other users or delaying the response time of the website, server or database. Hacker try to use up the resources of the network to complete attack. For example, use up theContinue reading “Lab 4: Network Vulnerabilities Part 2”

SEC602 Lab 6: Encryption and Hashing

Ans1 Discuss the use of MD5 hashes for software downloads. MD5 is an algorithm used for producing a fixed length character to make sure the data is correct during download. MD5 is not an encryption method but it is very usefully in data transfusing. In the example of software download, no matter the size ofContinue reading “SEC602 Lab 6: Encryption and Hashing”

Design a site like this with WordPress.com
Get started