![]() Each security issue identified includes details of what was found together with the impact of the issue, how easy it would be for an attacker to exploit and a recommendation. ![]() This report is comprised of the following sections:Ī security audit section which details any identified security-related issues. This report was produced by Nipper Studio on Tuesday, August 8, 2017. Infrastructure 元 Switch Secure Technical Implementation Guide - Cisco Nipper Studio performed one DISA STIG compliance audit. Nipper Studio performed a vulnerability audit of the one device detailed in the scope. 8 issues (27%) were rated as high, 5 issues (17%) were rated as medium, 11 issues (37%) were rated as low and 6 issues (20%) were rated as informational. Nipper Studio can draw the following statistics from the results of this security assessment, (percentages have been rounded). Furthermore the clear-text services are often used for administration purposes and a malicious user, or attacker, who is able to monitor the communications may also gain access to authentication credentials that could then lead them to gain administrative access to the system. It is important that all clear-text protocol services should be replaced with cryptographically secure alternatives in order to help prevent unauthorized eavesdropping of potentially sensitive data. Nipper Studio identified a number of clear-text protocol related issues. Each of the issues identified is described in greater detail in the main body of this report. Although significant issues were identified that Nipper Studio recommends should be reviewed as soon as is practical, most of the security issues were rated as low or informational. ![]() Nipper Studio performed a security audit of the one device detailed in the scope and identified 30 security-related issues. ![]() The scope of this audit was limited to the device detailed in Table 1. The audit consisted of the following components:Ī software vulnerability audit report (Part 3) Ī Defence Information Systems Agency Security Technical Implementation Guide compliance report (Part 4) Nipper Studio performed an audit on Tuesday, Augof the network device detailed in the scope. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |