The audience for your security assessment report (SAR) is the leadership of your organization, which is made up of technical and nontechnical staff. Some of your audience will be unfamiliar with operating systems (OS). As such, you will begin your report with a brief explanation of operating systems fundamentals and the types of information systems.
Click on and read the following resources that provide essential information you need to know before creating a thorough and accurate OS explanation:
After reviewing the resources, begin drafting the OS overview to incorporate the following:
Include a brief definition of operating systems and information systems in your SAR.
You just summarized operating systems and information systems for leadership. In your mind, you can already hear leadership saying “So what?” The organization’s leaders are not well versed in operating systems and the threats and vulnerabilities in operating systems, so in your SAR, you decide to include an explanation of advantages and disadvantages of the different operating systems and their known vulnerabilities.
Prepare by first reviewing the different types of vulnerabilities and intrusions explained in these resources:
Based on what you gathered from the resources, compose the OS vulnerability section of the SAR. Be sure to:
You will provide leadership with a brief overview of vulnerabilities in your SAR.
You have just finished defining the vulnerabilities an OS can have. Soon you will perform vulnerability scanning and vulnerability assessments on the security posture of the organization’s operating systems. But first, consider your plan of action. Read these two resources to be sure you fully grasp the purpose, goals, objectives, and execution of vulnerability assessments and security updates:
Then provide the leadership with the following:
In your report, discuss the strength of passwords, any Internet Information Services’ administrative vulnerabilities, SQL server administrative vulnerabilities, and other security updates and management of patches, as they relate to OS vulnerabilities.
Note: You will use the tools in Workspace for this step. If you need help outside the classroom, register for the CLAB 699 Cyber Computing Lab Assistance (go to the Discussions List for registration information). Primary lab assistance is available from a team of lab assistants. Lab assistants are professionals and are trained to help you.
Click here to access the instructions for Navigating the Workspace and the Lab Setup.
Enter Workspace and complete the lab activities related to operating system vulnerabilities.
Click here to access the Project 2 Workspace Exercise Instructions. Explore the tutorials and user guides to learn more about the tools you will use.
You’ve prepared for your assessment; now it’s time to perform.
Security and vulnerability assessment analysis tools, such as Microsoft Baseline Security Analyzer (MBSA) for Windows OS and OpenVAS for Linux OS, are stand-alone tools designed to provide a streamlined method for identifying common security misconfigurations and missing security updates for the operating systems and applications. These tools work on layers 5-7 of the Open System Interconnection (OSI) model.
Your leadership will want to understand the differences and commonalities in the capabilities of both tools and will want this included in the SAR.
Use the tools’ built-in checks to complete the following for Windows OS (e.g., using Microsoft Baseline Security Analyzer, MBSA):
You will also complete a similar exercise for Linux OS (e.g., using the OpenVAS tool). Select the following links to learn more about OpenVAS and computer networks:
Utilize the OpenVAS tool to complete the following:
Knowledge acquired from this Workspace exercise and capability of this tool will help your company’s client organizations secure the computer networks’ resources and protect corporate data from being stolen.
Validate and record the benefits of using these types of tools. You will include this in the SAR.
By utilizing security vulnerability assessment tools, such as MBSA and OpenVAS, you now have a better understanding of your system’s security status. Based on the results provided by these tools, as well as your learning from the previous steps, you will create the Security Assessment Report (SAR).
In your report to the leadership, emphasize the benefits of using a free security tool such as MBSA. Then make a recommendation for using these types of tools (i.e., MBSA and OpenVAS), including the results you found for both.
Remember to include these analyses and conclusions in the SAR deliverable:
Include your SAR in your final deliverable to leadership.