Identify Unnecessary Services from a Saved Vulnerability

This essay has been submitted by a student. This is not an example of the work written by professional essay writers.

Subject:
Published:
4 March 2016

Remember! This is just a sample.

You can get your custom paper by one of our expert writers.

Get custom essay

101 writers online

Nmap/Zenman is an application that allows users to scan networks to see what ports and services are open. It can be used by network security to find holes in their networks and plan what to do with them or it can be used by hackers to scan other networks to get a clear look at a networks topology and map out where everything is and plan for an attack. In this case, we have a scan of our network at Corporation Techs and need to look at what services that we have and make a decision on whether or not we should keep or get rid of them.

According to the scan we have, we have a bunch of difference services that we use. Simple Mail Transfer Protocol (SMTP) is how our employees sent their mail. Post Office Protocol (POP) is the services on how we receive them. These are both important in any business so they could send and receive messages so I would not recommend closing them.

As I look through more services that we have on our network, I notice that we have Sophos installed on our app server. Sophos is a company that works in anti-virus software. They been in business for a few years and to my knowledge they do a good job. However in this case we have enough anti-virus software and our network is very stable. Matter of fact, the scan also shows that we have other IDS and other services that will protect this network. I believe that Sophos is a good service but it is unnecessary at this time so I would suggest removing this.

My plan for removing unnecessary services is simple. Go though our network to see we have and have not been using and make a list of services that are necessary to keep this network working. Any services that do not make the cut, gets cut.

Cite this page

Identify Unnecessary Services from a Saved Vulnerability. (4 March 2016). Retrieved from https://studyscroll.com/identify-unnecessary-services-from-a-saved-vulnerability-essay

"Identify Unnecessary Services from a Saved Vulnerability" StudyScroll, 4 March 2016, https://studyscroll.com/identify-unnecessary-services-from-a-saved-vulnerability-essay

StudyScroll. (2016). Identify Unnecessary Services from a Saved Vulnerability [Online]. Available at: https://studyscroll.com/identify-unnecessary-services-from-a-saved-vulnerability-essay [Accessed: 28 January, 2023]

"Identify Unnecessary Services from a Saved Vulnerability" StudyScroll, Mar 4, 2016. Accessed Jan 28, 2023. https://studyscroll.com/identify-unnecessary-services-from-a-saved-vulnerability-essay

"Identify Unnecessary Services from a Saved Vulnerability" StudyScroll, Mar 4, 2016. https://studyscroll.com/identify-unnecessary-services-from-a-saved-vulnerability-essay

"Identify Unnecessary Services from a Saved Vulnerability" StudyScroll, 4-Mar-2016. [Online]. Available: https://studyscroll.com/identify-unnecessary-services-from-a-saved-vulnerability-essay. [Accessed: 28-Jan-2023]

StudyScroll. (2016). Identify Unnecessary Services from a Saved Vulnerability. [Online]. Available at: https://studyscroll.com/identify-unnecessary-services-from-a-saved-vulnerability-essay [Accessed: 28-Jan-2023]

Don't use plagiarized sources. Get your custom essay..

get custom paper

We use cookies to personalyze your web-site experience. By continuing we’ll assume you board with our cookie policy.