Analyze network systems for cybersecurity vulnerabilities.
Analysis of systems should include detecting vulnerabilities by using
- port scanning (i.e., Network Mapper [Nmap])
- software update services
- baseline creation
- industry standard vulnerability scanning
- other tools, such as Microsoft Baseline Security Analyzer (MBSA)
- normal network traffic
- malicious network traffic (i.e., Address Resolution Protocol [ARP] poisoning, teardrop attack, SMURF attack).