Purpose

The primary objective of this cybersecurity project is to execute comprehensive vulnerability assessments by employing two distinct vulnerability scanning tools - Qualys and Nessus. Following the identification of vulnerabilities, the project will focus on mitigating these security risks through the application of relevant patches, updates, and upgrades. Additionally, the project entails eliminating bloatware and removing applications that are no longer utilised, further enhancing the system's security posture.

Scope

This project is exclusively focused on enhancing the cybersecurity posture of a single personal computing device, specifically a MacBook Air.

Feel free to expand the scope of this project.

Overview

The inception of this project involves the initial setup and utilisation of two vulnerability scanning tools: Nessus and Qualys. This phase includes downloading Nessus, registering for Qualys services, and conducting preliminary system scans. Upon completion of these scans, a meticulous analysis of the generated reports is required to identify and understand the vulnerabilities detected within the system.

Concurrently, this project mandates a comprehensive review of the device's operating system to ensure it is fully updated. This step is crucial for maintaining system integrity and security. Additionally, part of this process involves the elimination of unused applications and software, contributing to the overall cleanliness and optimisation of the computer's performance.

After these preparatory measures, the focus shifts to the remediation of identified vulnerabilities. This involves a systematic approach to addressing each vulnerability, applying necessary patches, and making adjustments to fortify the system's security.

The project culminates with a final set of scans using both Nessus and Qualys to verify the effectiveness of the remediation efforts. This validation phase is essential for ensuring that all vulnerabilities have been adequately addressed and the system's security posture has been significantly enhanced.

Project Checklist

  1. Preparation and Initial Scans
    1. Download Nessus
    2. Sign up for Qualys services
    3. Launch Initial vulnerability scans using both Nessus and Qualys
  2. Analysis of Scan Reports
    1. Carefully review the vulnerability reports generated by Nessus and Qualys.
    2. Identify and understand the vulnerabilities listed in the reports.
  3. System Update and Cleanup
    1. Check and update the operating system to the latest version.
    2. Uninstall any unused applications or software.
    3. Perform a general cleanup to optimise the computer's performance.
  4. Vulnerability Remediation
    1. Address each identified vulnerability systematically.
    2. Apply necessary patches and updates to mitigate vulnerabilities.
    3. Make any adjustments or configurations to enhance security.
  5. Validation and Final Scans
    1. Conduct final vulnerability scans using both Nessus and Qualys.
    2. Analyse the reports from the final scans to ensure all vulnerabilities have been remediated.
    3. Validate the success of remediation efforts and the enhanced security posture of the system.