Cyber Security of SCADA Systems test bed - Senior Design - Iowa ...
Cyber Security of SCADA Systems test bed - Senior Design - Iowa ...
Cyber Security of SCADA Systems test bed - Senior Design - Iowa ...
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Is limited by the plugins that have been created<br />
o Various Open Source Tools<br />
Advantages<br />
Usually free<br />
Disadvantages<br />
Not necessarily well documented or supported<br />
S<strong>of</strong>tware Selection<br />
The first piece <strong>of</strong> s<strong>of</strong>tware used in performing the vulnerability assessment will be Nessus <strong>Security</strong><br />
Scanner from Tenable <strong>Security</strong>. Nessus remotely scans computers for vulnerabilities, both client-side<br />
and server side, through <strong>test</strong>s that are specified via the s<strong>of</strong>tware’s plugin architecture. Nessus generates<br />
a report for each computer which contains a list <strong>of</strong> any vulnerabilities it discovered during the scan, each<br />
categorized by port number and severity level, as well as reports generated by the <strong>test</strong> plugin itself.<br />
These reports can be viewed directly on the Nessus Server via a web interface, or exported as an HTML<br />
file.<br />
Figure 2: Sample Nessus Workstation Report<br />
SDMAY11-11 12