Tuesday, September 10, 2019

Security tools comparison Essay Example | Topics and Well Written Essays - 2500 words

Security tools comparison - Essay Example Finally, criteria 4 produced separate advantages and disadvantages for each tool. In this regard, GFI LANguard proved to better when remediating vulnerabilities that required downloaded patches. On the other hand, DMV has an upper hand at remediating vulnerabilities that require adjustments to the system. 23 Evaluation 23 Reference 24 Introduction This report’s main rationale of is to create a responsiveness and understanding of a variety of tools essential to protect computer networks against attack. Aim The report aims to analyse comparatively two vulnerability scanners of a similar type. Objective The objectives of the report are: 1. To provide a brief overview of the two vulnerability scanners and their features accompanied by either diagrams or screenshots. 2. To provide a brief discussion of the criteria used to compare the two vulnerability scanners. 3. To provide a comparison of the two vulnerability scanners using the criteria discussed. 4. To provide a conclusion tha t summarises the relative strengths and weaknesses of the two vulnerability scanners. ... ir roles, these vulnerability scanners depend upon databases, which store essential information necessary to analyse vulnerabilities in a system (SearchToolQuality.com, 2006) Scanning vulnerabilities is crucial in securing a system or a network. In addition, it can identify weaknesses in the system or network that a potential attacker can use and effectively prepares the system or network against such attackers. For that reason, the fundamental objective of utilizing a vulnerability scanner is to discover recognized vulnerabilities and eradicate them prior to an attacker using them against the system or network (Bradley, 2004). According to SearchToolQuality.com (2006), an ideal vulnerability scanner should have the following capabilities: 1. Unfailing and an up-to-date database of vulnerabilities 2. Effective detection of definite vulnerabilities devoid of numerous erroneous positives 3. Ability to carry out compound scans simultaneously 4. Ability to execute trend analyses and pres ent a comprehensible report of the results 5. Propose methods of getting rid of the exposed vulnerabilities In addition, Zorz (2011) pointed out the following significant factors to consider while deciding on the best vulnerability scanner for a precise need, which correspond with SearchToolQuality.com’s (2006) capabilities: Scalability – This implies that a tool should be able to cope with high workload when used by large or distributed networks. In effect, this corresponds with the third capability from SearchToolQuality.com (2006). Results accuracy – Since analysing, prioritising and remediating the security issues can be time consuming, it is essential to secure the network within the shortest timeframe. However, it is important to point out that some factors such as duplication

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.