Great Deal! Get Instant $10 FREE in Account on First Order + 10% Cashback on Every Order Order Now

CYB 240 Project One Guidelines and Rubric Vulnerability Summary Report CYB...

1 answer below »
CYB 240 Project One Guidelines and Ru
ic Vulnerability Summary Report























CYB 240 Project One Guidelines and Ru
ic
Vulnerability Summary Report
Overview
When you perform new system-wide hardware or software updates, it’s a good idea to run a vulnerability scan. Reading vulnerability scan reports is an
important skill for you as a cybersecurity analyst. Interpreting and prioritizing what is important to the organization will be a key part of your role. You will get to
practice these skills in this project by creating a vulnerability summary report.
The project incorporates one milestone, which will be submitted in Module Four. The project will be submitted in Module Six.
In this assignment, you will demonstrate your mastery of the following competencies:
● CYB-240-01: Identify and troubleshoot deficiencies related to web application security
● CYB-240-03: Identify and troubleshoot deficiencies related to tiered web application security
Scenario
You are a cybersecurity analyst and work for an IT company that is having issues with its computer systems. The company has supplied you with vulnerability
analysis scan (OpenVAS) reports that detail several issues with security. You will use the reports to identify the vulnerabilities that you will analyze for your
project.
The system you will be working with is three tiered with a database back-end server and a web server front end. The system contains both Windows and Linux
components.
Prompt
You must address the critical elements listed below in your vulnerability summary report. The codes shown in
ackets indicate the course competency to which
each critical element is aligned.
I. Server: Select a server-related vulnerability from the vulnerability analysis report. For the selected vulnerability:
A. Briefly describe the risk posed by the vulnerability. [CYB-240-01]
B. Summarize one other incident this vulnerability has caused in the industry. [CYB-240-01]
C. Provide evidence of successful remediation of the vulnerability (e.g., screenshot of successful software upgrade, vulnerability analysis report, or
failed Metasploit attack). [CYB-240-01]
1




















II. Other tier: Select a non-server-related vulnerability from the vulnerability analysis report. For the selected vulnerability:
A. Briefly describe the risk posed by the vulnerability. [CYB-240-03]
B. Summarize one other incident this vulnerability has caused in the industry. [CYB-240-03]
C. Provide evidence of successful remediation of the vulnerability (e.g., screenshot of successful software upgrade, vulnerability analysis report, or
failed Metasploit attack). [CYB-240-03]
Project One Ru
ic
Guidelines for Submission: Your submission should be 2–3 pages in length and should be written in APA format. Use double spacing, 12-point Times New Roman
font, and one-inch margins. Include at least two references, which should be cited according to APA style. Use a file name that includes the course code, the
assignment title, and your name—for example, CYB_123_Assignment_Firstname_Lastname.docx.
Critical Elements Exemplary (100%) Proficient (85%) Needs Improvement (55%) Not Evident (0%) Value
Server:
Risk
[CYB-240-01]
Meets “Proficient” criteria
and addresses critical
element in an exceptionally
clear, insightful,
sophisticated, or creative
manner
Briefly describes the risk
posed by the vulnerability
Addresses “Proficient”
criteria, but there are gaps in
clarity, logic, or detail
Does not address critical
element, or response is
i
elevant
15
Server:
Other Incident
[CYB-240-01]
Meets “Proficient” criteria
and addresses critical
element in an exceptionally
clear, insightful,
sophisticated, or creative
manner
Summarizes one other
incident this vulnerability has
caused in the industry
Addresses “Proficient”
criteria, but there are gaps in
clarity, logic, or detail
Does not address critical
element, or response is
i
elevant
15
Server:
Evidence of Successful
Remediation
[CYB-240-01]
Meets “Proficient” criteria
and addresses critical
element in an exceptionally
clear, insightful,
sophisticated, or creative
manner
Provides evidence of
successful remediation of the
identified vulnerability
Addresses “Proficient”
criteria, but there are gaps in
clarity, logic, or detail
Does not address critical
element, or response is
i
elevant
15
Other Tier:
Risk
[CYB-240-03]
Meets “Proficient” criteria
and addresses critical
element in an exceptionally
clear, insightful,
sophisticated, or creative
manner
Briefly describes the risk
posed by the vulnerability
Addresses “Proficient”
criteria, but there are gaps in
clarity, logic, or detail
Does not address critical
element, or response is
i
elevant
15
2

Critical Elements Exemplary (100%) Proficient (85%) Needs Improvement (55%) Not Evident (0%) Value
Other Tier:
Other Incident
[CYB-240-03]
Meets “Proficient” criteria
and addresses critical
element in an exceptionally
clear, insightful,
sophisticated, or creative
manner
Summarizes one other
incident this vulnerability has
caused in the industry
Addresses “Proficient”
criteria, but there are gaps in
clarity, logic, or detail
Does not address critical
element, or response is
i
elevant
15
Other Tier:
Evidence of Successful
Remediation
[CYB-240-03]
Meets “Proficient” criteria
and addresses critical
element in an exceptionally
clear, insightful,
sophisticated, or creative
manner
Provides evidence of
successful remediation of the
identified vulnerability
Addresses “Proficient”
criteria, but there are gaps in
clarity, logic, or detail
Does not address critical
element, or response is
i
elevant
15
Articulation of Response Submission is free of e
ors
elated to grammar, spelling,
and organization and is
presented in a professional
and easy-to-read format
Submission has no major
e
ors related to grammar,
spelling, or organization
Submission has some e
ors
elated to grammar, spelling,
or organization that
negatively impact readability
and articulation of main
ideas
Submission has critical e
ors
elated to grammar, spelling,
or organization that prevent
understanding of ideas
10

Total 100%
3
    CYB 240 Project One Guidelines and Ru
ic Vulnerability Summary Report
    Overview
    Scenario
    Prompt
    Project One Ru
ic

CYB 240 Project One Milestone Template
To complete this template, replace the phrases in
ackets with the relevant information.
Firewall OpenVAS Report
Vulnerability One
· Identification: CVSS: 10.0 PHP End of Life Detection (Windows)
· Description: It is not recommended to utilize the server's outdated version of PHP until it has been upgraded. Attackers could use it as leverage to undermine the host's security if it isn't repaired.
· Mitigation: To make sure it is a compatible version, the PHP version just on server has to be upgraded and validated.
Vulnerability Two
· Identification: CVSS: 10.0 OpenSSL End of Life Detection (Windows)
· Description: The server's outdated version of OpenSSL is not getting any updates. Before it is updated, it shouldn't be utilized. Attackers could use that as leverage to undermine the host's security if it isn't repaired.
· Mitigation: A confirmed supported version of OpenSSL should be installed on the host, and its installation must be done co
ectly.
Windows Server OpenVAS Report
Vulnerability One
· Identification: CVSS: 10.0 phpMyAdmin End of Life Detection (Windows)
· Description: It is not recommended to utilize the server's outdated version of phpMyAdmin until it has been upgraded. Attackers may use it as leverage to
each the server's or network's security if it isn't repaired.
· Mitigation: A confirmed supported version of phpMyAdmin should be updated on the host, and it should also be installed co
ectly.
Vulnerability Two
· Identification: CVSS: 10.0 PHP Multiple Vulnerabilities - Sep11 (Windows)
· Description: It is not advised to utilize the server, which runs PHP, if it has not been updated, since a successful exploit of this vulnerability might allow attackers to access sensitive information or inflict a denial of service.
· Mitigation: Verify that perhaps the new version has indeed been installed before upgrading the existing PHP version with Version 5.3.7 or later.
Ubuntu Server OpenVAS Report
Vulnerability One
· Identification: CVSS 10.0: TWiki XSS and Command Execution Vulnerabilities
· Description: Cross-Site Scripting (XSS) attacks on the TWIki server might cause harm to end users without their awareness by gathering cookie-based login information and getting around some Multifactor Authentication configurations on accounts.
· Mitigation: Upgrade TWiki to version 4.2.4 & make sure the new version was installed co
ectly.
Vulnerability Two
· Identification: CVSS: 7.5: When processing query string arguments from php files, PHP-CGI-based installations are vulnerable.
· Description: An information-disclosure vulnerability in PHP could let remote attackers access sensitive data and execute a
itrary PHP code on the vulnerable computers, among other things.
· Mitigation: To fix this vulnerability, upgrade PHP to version 5.4.3 or 5.3.13, and make sure it is installed co
ectly.
Answered 3 days After Dec 05, 2022

Solution

Shubham answered on Dec 08 2022
50 Votes
1. Serve
The risk possessed includes use of the outdated version of phpMyAdmin till it has been upgraded. In this, attackers may use it as the leverage for
eaching the server if it is not handled properly. It is not advised that it runs PHP and if it is not updated then it can exploit the vulnerability that might allow attackers to access all sensitive information. It includes attacks like DOS attacks that include ending numerous services that can serve the capability of a web server. It includes exploiting the e
or in the application that can cause a DOS attack. The unnecessary services are enabled and information is not masked. Attackers can compromise the web server through various attacks like command injection and SQL injection.
The web server misconfiguration in OWASP includes web server improperly that can result in development of serious loopholes in the web server that has given attackers the prospect to exploit the misconfigured web server to get access to sensitive information. Vulnerabilities are improperly configured and it can create issues with...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here