Across
- 6. The objective of this step is the closing of security gaps.
- 7. The assessment of critical servers, which may be vulnerable to attacks if not adequately tested or not generated from a tested machine image.
- 8. are software packages used on information systems or networks to scan looking for weaknesses like open port exploitations, weak passwords, and security configuration errors leading to potential misuse and abuse.
- 10. It performs configuration scans of servers, network devices and databases to test for specific policy settings and can check internal security policy compliance. Nessus® can perform scans of ports, firewall configurations, network devices (i.e. routers, switches, etc.), and provides reports back to the system administrator.
- 11. The identifying of security vulnerabilities in web applications and their source code by automated scans on the front-end or static/dynamic analysis of source code.
- 13. Monitors the network in real-time, continuously looking for new hosts, applications and new vulnerabilities without requiring the need for active scanning.
- 14. The objective of this step is the prioritizing of vulnerabilities
- 16. provides network administrators and security personnel with mechanisms to prevent, detect, track, report, and remediate malicious computer-related activities and incidents across all Department of Defense (DoD) networks and information systems.
Down
- 1. The assessment of policies and practices to prevent unauthorized access to private or public networks and network-accessible resources.
- 2. The objective of this step is to identify the source and root cause of the vulnerabilities identified in step one.
- 3. The assessment of databases or big data systems for vulnerabilities and misconfigurations, identifying rogue databases or insecure dev/test environments, and classifying sensitive data across an organization’s infrastructure.
- 4. tool automatically identifies configuration vulnerabilities threatening the security of the DoD's computer systems
- 5. is designed to support a faster pace of system updating and patch management for our network connected Windows devices. Quick and efficient delivery of high and critical security updates will ensure that you meet your compliance deadlines for TCNO and MTO’s.
- 9. Single console access used by ACAS managing Nessus® scans at the enterprise network level. Security Center provides real-time detection of network anomalies and is scalable, meaning it can grow to accommodate as many scanners as needed to cover the entire network
- 12. A DoD information system used to record, track, and disseminate critical vulnerability information throughout the DoD Enterprise network.
- 15. The objective of this step is to draft a comprehensive list of an application’s vulnerabilities.
