CMIT 421 Project 3 Presentation Student’s Name Institutional Affiliation Introduction Mercury USA is currently facing many issues with its security system. The company experiences vulnerabilities resulting from false positives, debugs, and information overrides detected by the system. Therefore, the company needs to implement a concrete vulnerability management system to improve its operations' efficiency. The company can use a vulnerability tool called Nessus. ### Nessus is a virtual tool used for the scanning of vulnerabilities and detecting any potential threats to the network systems within an organization (Palmaers, 2013). It runs several controls on the computer systems to determine whether the present vulnerabilities can damage the computer systems. Similarly, it optimizes the tests that aim to rapidly identify defects within the systems and corrects them immediately, including the devices, operating systems, and the software applications available in the computer systems. It can also keep all the company domains free from malicious attacks and viruses that could control all the devices in the organization, connected to the internet. This presentation discusses how Mercury USA can use vulnerability management and Nessus to analyze its vulnerabilities in the computer systems. Vulnerability Management (VM) Process Recommendation Vulnerability management involves identifying, assessing, managing, and reporting the threats on an organization's security systems. It scans all the software running through the network systems within an organization. It identifies the security vulnerabilities that could potentially put the firm to jeopardy. This prevents attackers from compromising organizational information. This study source was downloaded by 100000775457090 from CourseHero.com on 08-15-2024 17:45:08 GMT -05:00 https://www.coursehero.com/file/68931124/CMIT-421-Project-3-Presentationdocx/ ###Vulnerability management process provides organizations with the appropriate coverage of risks and threats to predict the potential issues within the computer network system and remediate them immediately (Palmaers, 2013). It provides end-to-end management solutions to all the vulnerabilities to the computer systems that could protect the computer systems at Mercury USA. It also comes with vulnerability management software that automates the scanning process. The vulnerability scanner scans all the risks and evaluates them for further decision-making on managing these vulnerabilities. The Vulnerability Management Process This process takes four significant steps, including. Identification of vulnerabilities. Assessment of the vulnerabilities. Managing vulnerabilities. Vulnerabilities reporting. ### The first step of identifying the vulnerabilities includes using a scanner to scan for the potential threats. The vulnerability scanner scans the accessible systems to identify any open port that can correlate the information to the potential dangers and vulnerabilities (Palmaers, 2013). After placing the openness, the second step evaluates them and analyzes their risk to the organization. The third step includes managing the identified vulnerabilities. This can be achieved through This study source was downloaded by 100000775457090 from CourseHero.com on 08-15-2024 17:45:08 GMT -05:00 https://www.coursehero.com/file/68931124/CMIT-421-Project-3-Presentationdocx/ three significant efforts, including mitigation, remediation, and acceptance. Lastly, the vulnerabilities' reporting includes informing the firm about the identified threats and the best approaches to mitigate them. Vulnerability Scanning Tool Evaluation It is essential first to highlight the different types of vulnerability scanners. They include Cloud-based scanners. Network-based scanners. Host-based scanners. Database-based scanners. ### The Cloud-based vulnerability scanners are mainly applied in the detection of threats and risks within the systems that use Cloud such as websites (Nanda, 2017). Network-based scanners detect the vulnerabilities in the computer networks by running its services through open ports. Host-based scanners detect the vulnerabilities of individual hosts like network devices or computer systems. Finally, the data-based scanners identify vulnerabilities in the management systems containing databases for keeping private information. Mercury USA can use one or two of these tools to execute its security management plan. How the Unified Vulnerability Scanner Operates This study source was downloaded by 100000775457090 from CourseHero.com on 08-15-2024 17:45:08 GMT -05:00 https://www.coursehero.com/file/68931124/CMIT-421-Project-3-Presentationdocx/ First, it deploys Azure security to screen the virtual machines on the computer system. Secondly, it collects relevant information and sends them for further analysis. Third, it analyzes the vulnerabilities and sends the assessment data to the security center. ### Vulnerability scanning tools enable the systems to identify the threats and risks to security systems through different ways (Balatska, 2020). They use coding bugs for the code analysis vulnerability, rootkits, Trojans, and backdoor for the audit vulnerability systems. Furthermore, they are free from external threats to computer and security systems. Other benefits of the vulnerability scanners include affordability, fast operations, improved performance, reduced cost, and increased benefits to the organization and automatic functions provision. Nessus Vulnerability Report Analysis Ease of use. Cost-effective for any firm. Advanced detection of vulnerability leading to more protection. Correct visibility of computer networks. Comprises of plugins that provide timely protection. This study source was downloaded by 100000775457090 from CourseHero.com on 08-15-2024 17:45:08 GMT -05:00 https://www.coursehero.com/file/68931124/CMIT-421-Project-3-Presentationdocx/ ### The Nessus vulnerability report provides the analysts with a comprehensive summary of the existing vulnerabilities in the computer system based on the CVE data collection methods and analytics approaches (Nanda, 2017). The report analyzes the trending graphs on the detection of vulnerabilities for up to three months. It also provides an account of the mitigated vulnerabilities and the most severe vulnerabilities that would need a strategic risk management plan. Therefore, Nessus offers organizations with a remarkable composure by ensuing they respond quickly to the identified vulnerabilities. Importance of Purchasing Nessus Improved scalability of the enterprise. It provides unlimited scanners that are compatible with Nessus. Has an advanced support system. It is less costly compared to other vulnerability management tools. Provides advanced reports and dashboards. It can be controlled in the Cloud. @@@ Tenable Nessus is ideal for Mercury USA as it can be applied in both small and large-scale firms (Balatska, 2020). It consists of features that can help this company to thoroughly understand its network system and evaluate, prioritize, and manage any potential vulnerability to the plans. Nessus vulnerability scanners can also enable Mercury USA to discover some of its significant assets and perform target profiling, malware detection, configuration auditing, and sensitive data discovery. Finally, Mercury USA can use Nessus Professional to run on devices like laptops and smartphones used by the firm's security professionals. Impacts of Failure to Implement the Tenable VM Process Failure to implement a Tenable VM Process or Nessus can lead to significant financial losses in Mercury USA. The company could experience hacker intrusions that would negatively impact its operations. The company will be more susceptible to attacks due to a framework for identifying and managing vulnerabilities. The company This study source was downloaded by 100000775457090 from CourseHero.com on 08-15-2024 17:45:08 GMT -05:00 https://www.coursehero.com/file/68931124/CMIT-421-Project-3-Presentationdocx/ will not be able to update its security systems to align with the existing software. ### The tenable VM process stops cybercriminals and hackers from attacking the security systems of organizations by making it difficult for hackers to enter the systems (Nanda, 2017). Failure to implement VM Processes can lead to security management gaps, which enable hackers to execute their attacks. The company will also be at risk due to a lack of regular updates of the security systems to reduce the vulnerability of attacks and prevent hackers' intrusion. Also, the available security systems in Mercury USA may not fully protect its systems against security threats and vulnerabilities. Failure to implement the VM process will only worsen the situation and increase the firm's approach to risks. Conclusion This paper addressed the benefits of using VM processes such as Nessus to organizations. From Mercury USA's reports, it is evident that the company needs a Nessus scanner to detect its weaknesses and mitigate them immediately. Nessus is the best VM tool for Mercury USA due to its numerous benefits. Failure to implement this VM will only lead to potentially significant losses to the firm. ### The Nessus tenable VM process is an all-inclusive vulnerability management tool that is designed to scan and evaluate the vulnerabilities and suggest the possible solutions for immediate remediation (Balatska, 2020). It provides a real-time scan to the security systems that could help Mercury USA to detect the potential threats and execute the countermeasures of dealing with the risks. References Balatska, V., & Shabatura, M. (2020). EXPLORATION OF COMPUTER NETWORK BY VULNERABILITY SCANNER NESSUS. Bulletin of Lviv State University of Life Safety. This study source was downloaded by 100000775457090 from CourseHero.com on 08-15-2024 17:45:08 GMT -05:00 https://www.coursehero.com/file/68931124/CMIT-421-Project-3-Presentationdocx/ https://doi.org/10.32447/20784643.20.2019.01 Nanda, S., & Ghugar, U. (2017). Approach to an efficient vulnerability management program. International Journal of Innovative Research in Computer and Communication Engineering (IJIRCCE), 5(6). Palmaers, T. (2013). Implementing a vulnerability management process. SANS Institute Reading Room. This study source was downloaded by 100000775457090 from CourseHero.com on 08-15-2024 17:45:08 GMT -05:00 https://www.coursehero.com/file/68931124/CMIT-421-Project-3-Presentationdocx/ Powered by TCPDF (www.tcpdf.org)