Verified Document

Calculating The Window Of Vulnerability For Smb Essay

Calculating the Window of Vulnerability for SMB Scenario

The report identifies the security breach within a small Microsoft workgroup LAN (Local Area Network). Within the group membership, the primary work group contains list of users within the Active Directory infrastructure which exists on the SMB server and confines on the LAN structure. The security breach is in violation of the integrity, confidentiality, availability of the security principles. (Zegzhda, Zegzhda, Kalinin, 2005). The security hole was caused by the accessibility of an unauthorized user and was detected by the server manufacturer the previous day. Meanwhile, it would take approximately 3 days before the security patch is made available. Additionally, LAN administrator will need at least minimum of one week to download, test and install the patch.

Calculating the Window of Vulnerability for SMB

The following timeline is used to calculate the Window of Vulnerability (WoV) of SMB security breach. To do the calculation, it is critical to understand the variables used in the calculation of window vulnerability. The WoV covers...

There are four parts used in calculating the vulnerability:
the Discovery-Time,

Exploit-Time,

Disclosure-Time, and Patch-Time.

Discovery Time: is the earliest time that a system administrator discovers and recognizes the vulnerability as a security risk. Typically, it would take one day for a vendor to identify the vulnerability. The discovery time could not be publicly displayed at this time. (Arbaugh, Fithen, & McHugh, 2000).

Exploit Time: The exploit time is the earliest date that an exploit of the vulnerability is available. The paper quantifies the hacker tools, virus or other sequence of commands that could be used as the advantages for the exploitation of the vulnerability. More importantly, the IT department would need the additional time to install…

Sources used in this document:
References

Arbaugh, W.A. Fithen, W.L. & McHugh, J. (2000).Windows of Vulnerability: A Case Study Analysis. Computer IEEE.

Zegzhda, P.D. Zegzhda D.P. Kalinin, M.O. (2005). Detection vulnerabilities within the configurations of MS windows operating system. Computer network security. 3685: 339-351.
Cite this Document:
Copy Bibliography Citation

Related Documents

Windows 7 Operating System Guide to Operating
Words: 1501 Length: 5 Document Type: Essay

Windows 7 Operating System Guide to Operating Systems The role of operating systems continues to be critical to the overall performance of enterprise information systems globally. In the majority of enterprises today there is a wide variation in the type of operating systems used, as the information needs vary significantly across organizations. The intent of this analysis is to evaluate the Microsoft Windows XP, Windows 7 and Linux operating systems. The architectures,

Window 7 Ultimate Windows 7 Ultimate Is
Words: 1618 Length: 6 Document Type: Essay

Window 7 Ultimate Windows 7 Ultimate is the powerful and most versatile edition of the Window 7. The Window 7 Ultimate combines the remarkable aspects and easy-to-use of the Window 7 Home Premium and Window 7 Professional. Typically, the Window 7 Ultimate is able to support the MUI (Multilingual User Interface) packages, UNIX application as well as the BitLocker Drive Encryption. More importantly, Window 7 Ultimate will assist a user to

Windows 7 Workgroup Consultation Setting Up a
Words: 912 Length: 3 Document Type: Essay

Windows 7 Workgroup Consultation Setting up a Windows 7 workgroup network is an effective way to manage user accounts for multiple computer users. There are several steps that should be implemented, however, to ensure the security and integrity of the network. Taking the necessary precautions will make it far more likely that the network operates in an efficient manner for the foreseeable future. Setting up User Accounts When the computer is initially set

Windows 7 Vs. Linux Ubuntu Comparison
Words: 617 Length: 2 Document Type: Essay

Windows 7 vs. Linux Ubuntu Comparison Windows 7 versus Ubuntu: Is Linux ready for the limited skill user? Windows has long been the default operating system of choice for the new or limited skill user. Linux attempts to claim part of the market with their open source product, but has thus far been largely unsuccessful. This paper will assess several important characteristics of operating systems for limited skill users, comparing Windows 7

Windows XP to Windows 7
Words: 6896 Length: 18 Document Type: Capstone Project

This will not only create a higher level of trust in the actual implementation, it will also set the foundation for more effective ongoing support for these users if they have any problems with the systems once they are installed. An effective change management strategy is as important, if not more important, than the technology upgrade and implementation plan itself (Gil, Tether, 2011). In implementing any it Project the concept

Windows 7 Operating System Vs. Ubuntu Linux Operating System
Words: 1100 Length: 3 Document Type: Essay

Windows 7 Operating System vs. Ubuntu Linux Operating System. Windows and Linux have sustained a head-to-head competitive race. Whilst Windows 7 is the premier and best selling operating system for personal desktop use, Linux, and Linux Ubuntu included, has achieved a reputation as the most prominent Free Software and Open Source operating system. Individuals -- such as I - prefer Windows due to better consumer familiarity, whilst other individuals, on

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now