Calculating the Window of Vulnerability for Smb Essay

Total Length: 642 words ( 2 double-spaced pages)

Total Sources: 2

Page 1 of 2

Calculating the Window of Vulnerability for SMB

Scenario

The report identifies the security breach within a small Microsoft workgroup LAN (Local Area Network). Within the group membership, the primary work group contains list of users within the Active Directory infrastructure which exists on the SMB server and confines on the LAN structure. The security breach is in violation of the integrity, confidentiality, availability of the security principles. (Zegzhda, Zegzhda, Kalinin, 2005). The security hole was caused by the accessibility of an unauthorized user and was detected by the server manufacturer the previous day. Meanwhile, it would take approximately 3 days before the security patch is made available. Additionally, LAN administrator will need at least minimum of one week to download, test and install the patch.

Calculating the Window of Vulnerability for SMB

The following timeline is used to calculate the Window of Vulnerability (WoV) of SMB security breach. To do the calculation, it is critical to understand the variables used in the calculation of window vulnerability.

Stuck Writing Your "Calculating the Window of Vulnerability for Smb" Essay?

The WoV covers the timeline between the moment a vendor identifies or discovers the vulnerability and the time taken to create publish and finally fix the vulnerability.

Calculating the Window vulnerability of SMB (Server Message Block) server is very critical to review the security status of the Window. There are four parts used in calculating the vulnerability:

the Discovery-Time,

Exploit-Time,

Disclosure-Time, and Patch-Time.

Discovery Time: is the earliest time that a system administrator discovers and recognizes the vulnerability as a security risk. Typically, it would take one day for a vendor to identify the vulnerability. The discovery time could not be publicly displayed at this time. (Arbaugh, Fithen, & McHugh, 2000).

Exploit Time: The exploit time is the earliest date that an exploit of the vulnerability is available. The paper quantifies the hacker tools, virus or other sequence of commands that could be used as the advantages for the exploitation of the vulnerability. More importantly,….....

Show More ⇣


     Open the full completed essay and source list


OR

     Order a one-of-a-kind custom essay on this topic


sample essay writing service

Cite This Resource:

Latest APA Format (6th edition)

Copy Reference
"Calculating The Window Of Vulnerability For Smb" (2013, February 09) Retrieved May 9, 2024, from
https://www.aceyourpaper.com/essays/calculating-window-vulnerability-smb-85782

Latest MLA Format (8th edition)

Copy Reference
"Calculating The Window Of Vulnerability For Smb" 09 February 2013. Web.9 May. 2024. <
https://www.aceyourpaper.com/essays/calculating-window-vulnerability-smb-85782>

Latest Chicago Format (16th edition)

Copy Reference
"Calculating The Window Of Vulnerability For Smb", 09 February 2013, Accessed.9 May. 2024,
https://www.aceyourpaper.com/essays/calculating-window-vulnerability-smb-85782