Calculating The Window Of Vulnerability For Smb Essay

PAGES
2
WORDS
642
Cite

Calculating the Window of Vulnerability for SMB Scenario

The report identifies the security breach within a small Microsoft workgroup LAN (Local Area Network). Within the group membership, the primary work group contains list of users within the Active Directory infrastructure which exists on the SMB server and confines on the LAN structure. The security breach is in violation of the integrity, confidentiality, availability of the security principles. (Zegzhda, Zegzhda, Kalinin, 2005). The security hole was caused by the accessibility of an unauthorized user and was detected by the server manufacturer the previous day. Meanwhile, it would take approximately 3 days before the security patch is made available. Additionally, LAN administrator will need at least minimum of one week to download, test and install the patch.

Calculating the Window of Vulnerability for SMB

The following timeline is used to calculate the Window of Vulnerability (WoV) of SMB security breach. To do the calculation, it is critical to understand the variables used in the calculation of window vulnerability. The WoV covers...

...

There are four parts used in calculating the vulnerability:
the Discovery-Time,

Exploit-Time,

Disclosure-Time, and Patch-Time.

Discovery Time: is the earliest time that a system administrator discovers and recognizes the vulnerability as a security risk. Typically, it would take one day for a vendor to identify the vulnerability. The discovery time could not be publicly displayed at this time. (Arbaugh, Fithen, & McHugh, 2000).

Exploit Time: The exploit time is the earliest date that an exploit of the vulnerability is available. The paper quantifies the hacker tools, virus or other sequence of commands that could be used as the advantages for the exploitation of the vulnerability. More importantly, the IT department would need the additional time to install…

Sources Used in Documents:

References

Arbaugh, W.A. Fithen, W.L. & McHugh, J. (2000).Windows of Vulnerability: A Case Study Analysis. Computer IEEE.

Zegzhda, P.D. Zegzhda D.P. Kalinin, M.O. (2005). Detection vulnerabilities within the configurations of MS windows operating system. Computer network security. 3685: 339-351.


Cite this Document:

"Calculating The Window Of Vulnerability For Smb" (2013, February 09) Retrieved April 19, 2024, from
https://www.paperdue.com/essay/calculating-the-window-of-vulnerability-85782

"Calculating The Window Of Vulnerability For Smb" 09 February 2013. Web.19 April. 2024. <
https://www.paperdue.com/essay/calculating-the-window-of-vulnerability-85782>

"Calculating The Window Of Vulnerability For Smb", 09 February 2013, Accessed.19 April. 2024,
https://www.paperdue.com/essay/calculating-the-window-of-vulnerability-85782

Related Documents

Windows 7 Operating System Guide to Operating Systems The role of operating systems continues to be critical to the overall performance of enterprise information systems globally. In the majority of enterprises today there is a wide variation in the type of operating systems used, as the information needs vary significantly across organizations. The intent of this analysis is to evaluate the Microsoft Windows XP, Windows 7 and Linux operating systems. The architectures,

Window 7 Ultimate Windows 7 Ultimate is the powerful and most versatile edition of the Window 7. The Window 7 Ultimate combines the remarkable aspects and easy-to-use of the Window 7 Home Premium and Window 7 Professional. Typically, the Window 7 Ultimate is able to support the MUI (Multilingual User Interface) packages, UNIX application as well as the BitLocker Drive Encryption. More importantly, Window 7 Ultimate will assist a user to

Windows 7 Workgroup Consultation Setting up a Windows 7 workgroup network is an effective way to manage user accounts for multiple computer users. There are several steps that should be implemented, however, to ensure the security and integrity of the network. Taking the necessary precautions will make it far more likely that the network operates in an efficient manner for the foreseeable future. Setting up User Accounts When the computer is initially set

Windows 7 vs. Linux Ubuntu Comparison Windows 7 versus Ubuntu: Is Linux ready for the limited skill user? Windows has long been the default operating system of choice for the new or limited skill user. Linux attempts to claim part of the market with their open source product, but has thus far been largely unsuccessful. This paper will assess several important characteristics of operating systems for limited skill users, comparing Windows 7

Windows XP to Windows 7
PAGES 18 WORDS 6896

This will not only create a higher level of trust in the actual implementation, it will also set the foundation for more effective ongoing support for these users if they have any problems with the systems once they are installed. An effective change management strategy is as important, if not more important, than the technology upgrade and implementation plan itself (Gil, Tether, 2011). In implementing any it Project the concept

Windows 7 Operating System vs. Ubuntu Linux Operating System. Windows and Linux have sustained a head-to-head competitive race. Whilst Windows 7 is the premier and best selling operating system for personal desktop use, Linux, and Linux Ubuntu included, has achieved a reputation as the most prominent Free Software and Open Source operating system. Individuals -- such as I - prefer Windows due to better consumer familiarity, whilst other individuals, on