All papers examples
Get a Free E-Book!
Log in
HIRE A WRITER!
Paper Types
Disciplines
Get a Free E-Book! ($50 Value)

Application Security, Essay Example

Pages: 2

Words: 566

Essay

There are numerous vulnerability assessment tools available in the market. However, top of the list tools that are rated high in functionality, performance and ease of use are GFI languard vulnerability scanner and Lumension scan. The cost of GFI languard starts from $32 per IP for 10 to 24 IP addresses and Lumension scan costs upto $8 per node per year. However, there are free vulnerability assessments tools available on the Internet such as Ecora Net Explorer that is a free discovery and port scanning utility available for free download (Ecora offers free vulnerability assessment tool.2003). Moreover, one more open source tool freely available named as Network mapper (Nmap) is used for auditing networks and operates on most platforms (Nmap.2011). These tools provide structural changes as patches are implemented on distributed servers from multiple locations. Moreover, managing weaknesses for physical and logical assets, these tools provide accessibility for managing virtual environments of the organization. Patch management cannot be considered as a general process for updating security patches on operating systems that are vulnerable. It is a multi-dimensional function that comprises of many vital components that contributes to the process itself (GERACE & CAVUSOGLU, 2009). Likewise, the patch management process along with reboot control provides, customized flagging and queuing various patches. For mitigating application security risks, patch management is essential. However, testing of patches is critical before implementing them in the live environment. Moreover, compensatory controls are also required for situations where a threat is identified and the manufacturer takes time to deliver patches. Patch management tools provides ease of delivering multiple patches to required machines on the network in a single process. However, the patch update process is addressed by the subscription process that ensures the availability, identification and announcement of the newly available patches for newly identified vulnerabilities affecting the servers and applications. Likewise, organizations adopt best practices to adopt patch management techniques. For instance, a cost effective method for a client side application is called as ‘standard build’ for workstations and laptops. Likewise, this method addresses the needs of enterprise wide systems along with ensuring overall system security. Moreover, it minimizes the cost and time by eliminating frequent vendor alerts for newly available patches and test patches prior to deployment. Although, the task becomes more complex if several platforms are operational, as testing patches will require a great deal of time and resources. Another method of deploying patch management is an automated approach that is accomplished by tools. These tools push different patches from different vendors to dissimilar platforms and applications from a centralized point. One of the tools that cater patches from a centralized location is Secunia’s Corporate Software Inspector (CSI) (SAVAGE, 2011). This tool comprises of a dedicated scanning engine called as a CSI agent, which can be remotely accessed for scanning all network segments, applications and devices (SAVAGE, 2011). However, the pitfalls for security patch management are addressed by adequate policies, procedures, required resources and efficient tools to identify and monitor vulnerabilities along with proper reporting for remediation (GERACE & CAVUSOGLU, 2009).

References

Ecora offers free vulnerability assessment tool.(2003). Computer Security Update, , 2. GERACE, T., & CAVUSOGLU, H. (2009). The critical elements of the patch management process. Communications of the ACM, 52(8), 117-121.

Lumension scan.(2011). SC Magazine: For IT Security Professionals (15476693), 22(2), 56-56.

Nmap.(2011). Computer Desktop Encyclopedia, , 1..

SAVAGE, M. (2011). Managing client-side security with patch management best practices. Information Security, 13(2), 4-8.

Time is precious

Time is precious

don’t waste it!

Get instant essay
writing help!
Get instant essay writing help!
Plagiarism-free guarantee

Plagiarism-free
guarantee

Privacy guarantee

Privacy
guarantee

Secure checkout

Secure
checkout

Money back guarantee

Money back
guarantee

Related Essay Samples & Examples

Voting as a Civic Responsibility, Essay Example

Voting is a process whereby individuals, such as an electorate or gathering, come together to make a choice or convey an opinion, typically after debates, [...]

Pages: 1

Words: 287

Essay

Utilitarianism and Its Applications, Essay Example

Maxim: Whenever I choose between two options, regardless of the consequences, I always choose the option that gives me the most pleasure. Universal Law: Whenever [...]

Pages: 1

Words: 356

Essay

The Age-Related Changes of the Older Person, Essay Example

Compare and contrast the age-related changes of the older person you interviewed and assessed with those identified in this week’s reading assignment. John’s age-related changes [...]

Pages: 2

Words: 448

Essay

The Problems ESOL Teachers Face, Essay Example

Overview The current learning and teaching era stresses globalization; thus, elementary educators must adopt and incorporate multiculturalism and diversity in their learning plans. It is [...]

Pages: 8

Words: 2293

Essay

Should English Be the Primary Language? Essay Example

Research Question: Should English be the Primary Language of Instruction in Schools Worldwide? Work Thesis: English should be adopted as the primary language of instruction [...]

Pages: 4

Words: 999

Essay

The Term “Social Construction of Reality”, Essay Example

The film explores the idea that the reality we experience is not solely determined by objective facts but is also shaped by the social and [...]

Pages: 1

Words: 371

Essay

Voting as a Civic Responsibility, Essay Example

Voting is a process whereby individuals, such as an electorate or gathering, come together to make a choice or convey an opinion, typically after debates, [...]

Pages: 1

Words: 287

Essay

Utilitarianism and Its Applications, Essay Example

Maxim: Whenever I choose between two options, regardless of the consequences, I always choose the option that gives me the most pleasure. Universal Law: Whenever [...]

Pages: 1

Words: 356

Essay

The Age-Related Changes of the Older Person, Essay Example

Compare and contrast the age-related changes of the older person you interviewed and assessed with those identified in this week’s reading assignment. John’s age-related changes [...]

Pages: 2

Words: 448

Essay

The Problems ESOL Teachers Face, Essay Example

Overview The current learning and teaching era stresses globalization; thus, elementary educators must adopt and incorporate multiculturalism and diversity in their learning plans. It is [...]

Pages: 8

Words: 2293

Essay

Should English Be the Primary Language? Essay Example

Research Question: Should English be the Primary Language of Instruction in Schools Worldwide? Work Thesis: English should be adopted as the primary language of instruction [...]

Pages: 4

Words: 999

Essay

The Term “Social Construction of Reality”, Essay Example

The film explores the idea that the reality we experience is not solely determined by objective facts but is also shaped by the social and [...]

Pages: 1

Words: 371

Essay