Assessment Part 2 Instructions To start, use the website https://www.cvedetails.com/top-50-vendor-cvssscore-distribution.php This website provides a CVSS Score Distribution for the Top 50 Vendors...

1 answer below »


Assessment Part 2






Instructions



To start, use the website
https://www.cvedetails.com/top-50-vendor-cvssscore-distribution.php



This website provides a CVSS Score Distribution for the Top 50 Vendors by Total Number of “Distinct” Vulnerabilities. You are to use this website to compare the vulnerabilities of Microsoft, Apple and Linux. Note that Linux will have a couple distributions. Pick a Linux distribution you would utilize in your company.



Compare the statistics of the various operating systems and their respective vulnerabilities. Compare the number of total vulnerabilities and their risk rankings. Which operating system would you use and why? Some things to consider:


· Employee knowledge of the system


· Total cost of the system


· Total cost to secure the system


· Are there any ethical issues by using one vendor?


o For instance, has any vendor been accused of utilizing customer data in a way it was not intended?





Requirements



The assessment must be submitted in Word format. The assessment should be 1-2 pages in length. The assessment should have a title page and a reference page. These pages are not included in the total page length. You must include at least two original sources in your paper.



For more information on APA style formatting, go to Academic Writer, formerly APA Style Central, under the Academic Tools area of this course.



Also review the university policy on plagiarism. If you have any questions, please contact your professor.



Be sure to include both in-text citations and references for all sources. For more information on APA style formatting, go to Academic Writer, formerly APA Style Central, under the Academic Tools area of this course.


Answered 1 days AfterMay 17, 2021

Answer To: Assessment Part 2 Instructions To start, use the website...

Shubham answered on May 18 2021
152 Votes
ASSESSMENT PART 2
According to the statistics, the vulnerability score of Windows has a weighted average of 7.20. The vulnerability in Windows includes use o
f remote code execution vulnerability that exists in the windows remote desktop gateway that allows unauthenticated attackers to connect with the target system with the use of RDP. The vulnerability also exists with the windows remote desktop client when the user connects with a malicious server. The attacker can exploit the vulnerability that can execute arbitrary codes on the computer of the connecting client. Based on statistics of the Apple operating system, 5021 vulnerabilities have been reported and 13 users have been exploited (Cvedetails.com, 2021). This indicated that Apple is more secure than Windows. Vulnerability found with the Apple operating system includes flaws that use free bugs and it resides in the web kits storage component of the operating system. It processes malicious web content that results in arbitrary code execution. A malicious certificate can appear to be issued for hostname. Single malware can bypass the protection that can only run applications with valid signatures. Debian is the Linux distribution that has been selected for comparison. According to statistics, 5090 vulnerabilities have been detected and 14 users have been affected with vulnerabilities. It has been found that Debian OS has been considered as the most problematic operating system. The vulnerability is because of error in the operating system. The vulnerability can be caused because of DDoS attacks and...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here