Provide (2) 150 words substantive response with a minimum of 1 APA references for RESPONSES 1 AND 2 below. Response provided should further discuss the subject or provide more insight. To further understand the response, below is the discussion post that’s discusses the responses. 100% original work and not plagiarized. Must meet deadline.
1. What software applications or “tools” would you use?
The first tool in my kit would be Cacti. Cacti is a very well know network monitoring software. After searching the web this product was found in most articles concerning network monitoring. Monitoring the network is half the battle. The second half is interpreting and visualizing the information. Cacti provides the user to present that information on charts and graphs they can customize to their personal preference. To help mitigate risk I would also add Avast for online protection. This antivirus is excellent in protecting from viruses and malware. It also disperses information to users when new fixes for threats and vulnerabilities are found.
Windows would be the incorporated platform. Windows is the most universally used OS in the private and commercial sectors. Familiarity with the OS leads to less chance of human error, the toughest element to mitigate in a risk assessment plan.
I would use AirMagnet for wireless network monitoring. It is a more proactive tool to use, which helps with identifying and combating threats. Total AV is a good antivirus I would user for the assessment. This product actively monitors and and some cases remove threats.
What software applications or “toolkit” would you use?
Right off the bat I would start to look for the best vulnerability scanner. I chose this because before I start to do any deep digging I want to know where I should start. This will also help me determine the scope of my assessment. The software I would choose for this would be Network Configuration manager due since it automatically finds issues across your network.
What platform (Operating System) would you use?
As far as the operating system I would probably go with windows. Although I could probably do just fine on a Mac I think windows would work best for me.
How does this toolkit differ from that you would use for an application security assessment, wireless security assessment? You can list other types of related assessments if you know how you might adjust for the given scenario.
For an application assessment I would tailor my tools more toward applications and the rights they access within the computer. With a network assessment I would focus more on security of the network.