CYB 240 Project One Guidelines and Rubric Vulnerability Summary ReportCYB...

1 answer below »
See attached


CYB 240 Project One Guidelines and Rubric Vulnerability Summary Report CYB 240 Project One Guidelines and Rubric Vulnerability Summary Report Overview When you perform new system-wide hardware or software updates, it’s a good idea to run a vulnerability scan. Reading vulnerability scan reports is an important skill for you as a cybersecurity analyst. Interpreting and prioritizing what is important to the organization will be a key part of your role. You will get to practice these skills in this project by creating a vulnerability summary report. The project incorporates one milestone, which will be submitted in Module Four. The project will be submitted in Module Six. In this assignment, you will demonstrate your mastery of the following competencies: ● CYB-240-01: Identify and troubleshoot deficiencies related to web application security ● CYB-240-03: Identify and troubleshoot deficiencies related to tiered web application security Scenario You are a cybersecurity analyst and work for an IT company that is having issues with its computer systems. The company has supplied you with vulnerability analysis scan (OpenVAS) reports that detail several issues with security. You will use the reports to identify the vulnerabilities that you will analyze for your project. The system you will be working with is three tiered with a database back-end server and a web server front end. The system contains both Windows and Linux components. Prompt You must address the critical elements listed below in your vulnerability summary report. The codes shown in brackets indicate the course competency to which each critical element is aligned. I. Server: Select a server-related vulnerability from the vulnerability analysis report. For the selected vulnerability: A. Briefly describe the risk posed by the vulnerability. [CYB-240-01] B. Summarize one other incident this vulnerability has caused in the industry. [CYB-240-01] C. Provide evidence of successful remediation of the vulnerability (e.g., screenshot of successful software upgrade, vulnerability analysis report, or failed Metasploit attack). [CYB-240-01] 1 II. Other tier: Select a non-server-related vulnerability from the vulnerability analysis report. For the selected vulnerability: A. Briefly describe the risk posed by the vulnerability. [CYB-240-03] B. Summarize one other incident this vulnerability has caused in the industry. [CYB-240-03] C. Provide evidence of successful remediation of the vulnerability (e.g., screenshot of successful software upgrade, vulnerability analysis report, or failed Metasploit attack). [CYB-240-03] Project One Rubric Guidelines for Submission: Your submission should be 2–3 pages in length and should be written in APA format. Use double spacing, 12-point Times New Roman font, and one-inch margins. Include at least two references, which should be cited according to APA style. Use a file name that includes the course code, the assignment title, and your name—for example, CYB_123_Assignment_Firstname_Lastname.docx. Critical Elements Exemplary (100%) Proficient (85%) Needs Improvement (55%) Not Evident (0%) Value Server: Risk [CYB-240-01] Meets “Proficient” criteria and addresses critical element in an exceptionally clear, insightful, sophisticated, or creative manner Briefly describes the risk posed by the vulnerability Addresses “Proficient” criteria, but there are gaps in clarity, logic, or detail Does not address critical element, or response is irrelevant 15 Server: Other Incident [CYB-240-01] Meets “Proficient” criteria and addresses critical element in an exceptionally clear, insightful, sophisticated, or creative manner Summarizes one other incident this vulnerability has caused in the industry Addresses “Proficient” criteria, but there are gaps in clarity, logic, or detail Does not address critical element, or response is irrelevant 15 Server: Evidence of Successful Remediation [CYB-240-01] Meets “Proficient” criteria and addresses critical element in an exceptionally clear, insightful, sophisticated, or creative manner Provides evidence of successful remediation of the identified vulnerability Addresses “Proficient” criteria, but there are gaps in clarity, logic, or detail Does not address critical element, or response is irrelevant 15 Other Tier: Risk [CYB-240-03] Meets “Proficient” criteria and addresses critical element in an exceptionally clear, insightful, sophisticated, or creative manner Briefly describes the risk posed by the vulnerability Addresses “Proficient” criteria, but there are gaps in clarity, logic, or detail Does not address critical element, or response is irrelevant 15 2 Critical Elements Exemplary (100%) Proficient (85%) Needs Improvement (55%) Not Evident (0%) Value Other Tier: Other Incident [CYB-240-03] Meets “Proficient” criteria and addresses critical element in an exceptionally clear, insightful, sophisticated, or creative manner Summarizes one other incident this vulnerability has caused in the industry Addresses “Proficient” criteria, but there are gaps in clarity, logic, or detail Does not address critical element, or response is irrelevant 15 Other Tier: Evidence of Successful Remediation [CYB-240-03] Meets “Proficient” criteria and addresses critical element in an exceptionally clear, insightful, sophisticated, or creative manner Provides evidence of successful remediation of the identified vulnerability Addresses “Proficient” criteria, but there are gaps in clarity, logic, or detail Does not address critical element, or response is irrelevant 15 Articulation of Response Submission is free of errors related to grammar, spelling, and organization and is presented in a professional and easy-to-read format Submission has no major errors related to grammar, spelling, or organization Submission has some errors related to grammar, spelling, or organization that negatively impact readability and articulation of main ideas Submission has critical errors related to grammar, spelling, or organization that prevent understanding of ideas 10 Total 100% 3 CYB 240 Project One Guidelines and Rubric Vulnerability Summary Report Overview Scenario Prompt Project One Rubric CYB 240 Project One Milestone Template To complete this template, replace the phrases in brackets with the relevant information. Firewall OpenVAS Report Vulnerability One · Identification: CVSS: 10.0 PHP End of Life Detection (Windows) · Description: It is not recommended to utilize the server's outdated version of PHP until it has been upgraded. Attackers could use it as leverage to undermine the host's security if it isn't repaired. · Mitigation: To make sure it is a compatible version, the PHP version just on server has to be upgraded and validated. Vulnerability Two · Identification: CVSS: 10.0 OpenSSL End of Life Detection (Windows) · Description: The server's outdated version of OpenSSL is not getting any updates. Before it is updated, it shouldn't be utilized. Attackers could use that as leverage to undermine the host's security if it isn't repaired. · Mitigation: A confirmed supported version of OpenSSL should be installed on the host, and its installation must be done correctly. Windows Server OpenVAS Report Vulnerability One · Identification: CVSS: 10.0 phpMyAdmin End of Life Detection (Windows) · Description: It is not recommended to utilize the server's outdated version of phpMyAdmin until it has been upgraded. Attackers may use it as leverage to breach the server's or network's security if it isn't repaired. · Mitigation: A confirmed supported version of phpMyAdmin should be updated on the host, and it should also be installed correctly. Vulnerability Two · Identification: CVSS: 10.0 PHP Multiple Vulnerabilities - Sep11 (Windows) · Description: It is not advised to utilize the server, which runs PHP, if it has not been updated, since a successful exploit of this vulnerability might allow attackers to access sensitive information or inflict a denial of service. · Mitigation: Verify that perhaps the new version has indeed been installed before upgrading the existing PHP version with Version 5.3.7 or later. Ubuntu Server OpenVAS Report Vulnerability One · Identification: CVSS 10.0: TWiki XSS and Command Execution Vulnerabilities · Description: Cross-Site Scripting (XSS) attacks on the TWIki server might cause harm to end users without their awareness by gathering cookie-based login information and getting around some Multifactor Authentication configurations on accounts. · Mitigation: Upgrade TWiki to version 4.2.4 & make sure the new version was installed correctly. Vulnerability Two · Identification: CVSS: 7.5: When processing query string arguments from php files, PHP-CGI-based installations are vulnerable. · Description: An information-disclosure vulnerability in PHP could let remote attackers access sensitive data and execute arbitrary PHP code on the vulnerable computers, among other things. · Mitigation: To fix this vulnerability, upgrade PHP to version 5.4.3 or 5.3.13, and make sure it is installed correctly.
Answered 3 days AfterDec 05, 2022

Answer To: CYB 240 Project One Guidelines and Rubric Vulnerability Summary Report...

Shubham answered on Dec 08 2022
38 Votes
1. Server
The risk possessed includes use of the outdated version of phpMyAdmin till it has been upgraded.
In this, attackers may use it as the leverage for breaching the server if it is not handled properly. It is not advised that it runs PHP and if it is not updated then it can exploit the vulnerability that might allow attackers to access all sensitive information. It includes attacks like DOS attacks that include ending numerous services that can serve the capability of a web server. It includes exploiting the error in the application that can cause a DOS attack. The unnecessary services are enabled and information is not masked. Attackers can compromise the web server through various attacks like command injection and SQL injection.
The web server misconfiguration in OWASP includes web server improperly that can result in development of serious loopholes in the web server that has given attackers the prospect to exploit the misconfigured web server to get access to sensitive information. Vulnerabilities are improperly configured and it can create issues with...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here