Subject: Computer Science7 page APA style.As per SANS top 10 report (https://isc.sans.edu/top10.html) port 8080 is being targeted, being a security operations manager find out why the port is being targeted, discover current attacks being performed through this port, or current state of a known scanning suite.  Find sources, if possible, source code of attacks that are known to exploit this weakness and break down the code.  List known services on the affected ports that are associated and current attacks being performed on these services.Finally, to wrap-up your research, present the current risk level associated with this threat.  Use the FAIR methodology to derive your threat assessment.  The attached FAIR PDF will walk you through your analysis.  To complete the FAIR document:Step 1:  Asset at Risk will be the organization’s primary e-commerce web server.Step 2:  You will provide this answer based on your research.Step 3:  You will provide this answer based on your research; however, keep in mind how many times per day this is scanning the network, which will be given to your when you receive your topic.Step 4:  You will provide this answer based on your research.Step 5:  Assume the e-Commerce server is fully up-to-date and running the following base software:  Red Hat Linux, Apache, MariaDB, Drupal, PHP and is hardened based on base NIST recommendations for operations.Step 6-7:  CalculateStep 8:  Assume ModerateStep 9:  Assume ModerateStep 10:  Calculate and create this chart in excel with the appropriate item highlighted.  Include this chart in your paper and presentation.

Don't use plagiarized sources. Get Your Custom Essay on
Subject: Computer Science 7 page APA style. As per SANS top 10 report (https://isc.sans.edu/top10.html) port 8080 is being targeted, being a security operations manager find out why the port is being
Just from $10/Page
Order Essay

Order your essay today and save 10% with the discount code ESSAYHELP