Ask Question
15 February, 10:07

Identify one high severity vulnerability for each computer (if there is one). Describe the vulnerability and discuss control (s) to minimize the risk from the vulnerability.

+5
Answers (2)
  1. 15 February, 11:05
    0
    See the explanation section

    Explanation:

    The three computers involved are:

    Host 1: 192.168.100.103 Vulnerabilities: 71

    Host 2: 192.168.100.105 Vulnerabilities: 49

    Host 3: 192.168.100.106 Vulnerabilities: 22

    The vulnerability that has high severity is user password protection. During the scan, it was observed that the default password is 'user' for user account. This was observed in two computers (Host 1 and Host 2).

    This vulnerability is very dangerous because it allows unrestricted access to sensitive information or resources in an organization.

    The vulnerability can be fixed by setting a limit to number of times which a user can enter invalid credential for an account. If a user reach the limit, he/she will have to contact the administrator who can re-open access for him/her.
  2. 15 February, 13:49
    0
    Using old PHP versions

    Explanation:

    One high risk vulnerability is the one that exists on the remote web server and involves the use of a older version of PHP that have vulnerabilities. They are certain PHP versions that are prone vulnerabilities such as buffer overflow thereby affects the codes that runs on the web database. These databases mostly store information that are of importance to most organizations.

    Control measures taken to minimize this vulnerability are:

    upgrading to the latest PHP version and then hardening the PHP. INI file. The hardening is done by making changes to the setting in the PHP. INI file so as to boost security. Always update the system frequently. Security updates should be updated as soon as new updates are available.
Know the Answer?
Not Sure About the Answer?
Find an answer to your question ✅ “Identify one high severity vulnerability for each computer (if there is one). Describe the vulnerability and discuss control (s) to ...” in 📘 Computers and Technology if you're in doubt about the correctness of the answers or there's no answer, then try to use the smart search and find answers to the similar questions.
Search for Other Answers