[project]Conduct Vulnerability Assessment using OSSIM and deal with incident tickets

Vulnerability scan was conducted using Alien Vault OSSIM.

From the browser, I access 10.10.10.26 to use Alien Vault. I create the new scan job which conduct a vulnerability scan for windows 10 machines (10.10.10.10). Once the scan is completed, I can see the report of the scan on pdf and check the detail.

It is important to conduct a vulnerability scan to check if there is a weakness in the private network and Alien Vault issues the report with vulnerabilities based on their security risk levels (medium, info, high, etc) so that the system admin can work on the highest risks first.

overview

I used AlienVault to create the ticket. The ticket can be created based on type like vulnerability. It is important to make documentation and act based on that. Whenever any progress occurs, the progress should be written in the ticket. As a security engineer, it is important to practice dealing with a ticket constantly.

--

--

--

Security Analyst(Full-time), Cloud security engineer(internship). https://www.linkedin.com/in/takahiro-oda-881423197/

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

{UPDATE} Supermarked Dagligvare Cashier- Cash Register spil Hack Free Resources Generator

Russian Ministry of Digital Development launched an industry center for cybersecurity

How Can Geek Squad make a computer run like new?

NYM August Update

CompTIA Network+ Certified!

Instructions for Signatories

Ethical Hackers Aren’t Just Pretty Faces; They Play Vital Roles in AI.

{UPDATE} Pet Run Hack Free Resources Generator

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Takahiro Oda

Takahiro Oda

Security Analyst(Full-time), Cloud security engineer(internship). https://www.linkedin.com/in/takahiro-oda-881423197/

More from Medium

5 Use Cases of Kondukto CLI in CI/CD pipelines

Installing the Metasploit-framework On Ubuntu

Lopsided routing, a stealthy hole punch into FortiGate

No leaks seen in Beacon Home

Know The Importance Of HIPAA Compliance From Cyber Security Consultant In Orange County