Literature Review

1 answer below »
Answered Same DayAug 18, 2021

Answer To: Literature Review

Trinabrata answered on Aug 20 2021
141 Votes
2
Using NMAP to Ensure Authentic Assessment of Vulnerabilities
Literature Review
The use of Network Map (Nmap) as an authentic assessment tool for evaluating and ascertaining vuln
erabilities has been supported by a wide range of researchers, academicians and practitioners. In this respect it has to be noted that the efficacy of Nmap as a vulnerability assessment tool has remain unchallenged till date owing to its protective protocols and easy administration procedures. As a network scanning and hosting detection tool, Nmap has already gained much popularity worldwide and it has been acknowledged by practitioners as a useful tool to be used during several steps of penetration testing. The tool’s distinct usability lies in the fact that it can not only merely be used as a tool for gathering information and enumeration, but an also be used as a powerful utility that can be employed for detecting network vulnerabilities, and even more, it can be used as a security scanner as well (Shakeel, 2019N). The tool has been considered as a multipurpose one that can be run on multiple operating systems (OS) including Windows, Linux, BSD, and Mac.
In the research study, “Penetration Testing – Reconnaissance with NMAP Tool,” Kaur & Kaur (2017) have observed the utility of the tool in a thorough manner. Kaur & Kaur (2017), while conducting a penetration testing, utilizing Nmap, did observe the capability of the tool in terms of detecting shortfalls and security threats that really hurt the personal computer (PC) framework (or the computer system). The researchers have found that the efficacy of the Nmap tool, when used on Windows XP, as a vulnerability tool is quite admirable (Kaur & Kaur, 2017). It has also been observed by the researchers that Nmap tool can also be used effectively in finding the IP...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here