Paper Writing Services the network. These attacks can reach any system for wch port 445 has been opened on the firewall. Ts attack can be

Abstract
opening ports that are needed. The Holy Spirit is like a firewall around us. The only way the devil can have access to us is when the Lord allows m. God allowed Satan to test Job in Job chapter 1. The Bible states in Job 1:12 that “All right,” the Lord said to Satan, “everytng he has is

Vulnerability scanning includes scanning for specific functions, ports, protocols, and services that should not be accessible to users or devices and for improperly configured or incorrectly operating information flow mechanisms.  The security categorization of the information system guides the frequency and comprehensiveness of the vulnerability scans.  Vulnerability analysis for custom software and applications may require additional, more specialized techniques and approaches (SearchSecurity, 2018). I downloaded Nessus scanner on my personal workstation. I ran a full port scan on the computer wle the application firewall was on. The port that was open was port 80 and port 445. Many of the attacks using a port 445 exploit take place via the LAN. Malware seeking to exploit under-secured Windows systems is a likely source. There are some attacks, like WannaCry wch initiates from outside the network. These attacks can reach any system for wch port 445 has been opened on the firewall. Ts attack can be prevented using firewall (SearchSecurity, 2018). Ports 21 and 456 were open after the firewall was turned on. Some of the vulnerabilities associated with these ports are Invisible FTP and Hackers Paradise. These vulnerabilities can be prevented by only opening ports that are needed. The Holy Spirit is like a firewall around us. The only way the devil can have access to us is when the Lord allows m. God allowed Satan to test Job in Job chapter 1. The Bible states in Job 1:12 that “All right,” the Lord said to Satan, “everytng he has is in your power, but you must not hurt Job mself.” So, Satan left (New King James Version). Reference SearchSecurity. (2018). How to detect and defend against a TCP port 445 exploit. Retrieve from https://searchsecurity.techtarget.com/answer/Detecting-and-defending-against-TCP-port-445-attacks

Sample references
  • (‘Glasgow, R. E., Vogt, T. M., & Boles, S. M. (1999). Evaluating the public health impactof health promotion interventions: The RE-AIM framework. American Journal ofPublic Health, 89(9), 1322-1327.’,)
  • (‘Bamber, J. L., R. E. M. Riva, B. L. A. Vermeersen, and A. M. Lebrocq. 2009.Reassessment of the potential sea-level rise from a2009. Reassessment of the potential sea-level rise from a collapse of the West Antarctic Ice Sheet. Science 324(5929):901-903.’,)
  • (‘Helfrich, C. D., Li, Y.-F., Sharp, N. D., & Sales, A. E. (2009). Organizational readiness tochange assessment (ORCA): Development of an instrument based on thePromoting Action on Research in Health Services (PARIHS) framework.Implementation Science, 4(38), 38.276’,)
  • (‘Brown, D., & McCormack, B. (2011). Developing the practice context to enable moreeffective pain management with older people: An action research approach.Implementation Science, 6(9), 1-14.’,)

Need your ASSIGNMENT done? Use our paper writing service to score better and meet your deadline.


Click Here to Make an Order Click Here to Hire a Writer