Solved

ACAS / Nessus

Posted on 2016-07-24
2
83 Views
Last Modified: 2016-08-02
Hi,

I have ACAS and Nessus Scan.  I am learning this, and I am trying to try a new scan.  WOuld I do this from the Nessus Scanner or ACAS?

Thansk
0
Comment
Question by:Eric Donaldson
2 Comments
 
LVL 61

Expert Comment

by:gheist
ID: 41727395
What is ACAS?
0
 
LVL 61

Accepted Solution

by:
btan earned 500 total points
ID: 41727586
I believe ACAS is  Assured Compliance Assessment Solution (ACAS). Solution that is ACAS awarded by DISA means this
The award provided a mechanism to enable the assessment of U.S. Department of Defense (DoD) enterprise networks and connected IT systems against DoD standards, as well as to identify any known system vulnerabilities.
http://ask-acas.info/faq/

For Nessus scan, I suggest you see Tenable info and in short, you can do from scanner or PVS as per required by ACAS
•SecurityCenter: Offering a centralized view for all network activity including asset discovery, vulnerability detection, configuration and compliance auditing, and event management for large, complex networks.


•Nessus Vulnerability Scanner: Performing network scanning, patch auditing and configuration testing. Nessus is the world's most widely-deployed vulnerability scanner, with more than five million downloads to-date.

•Passive Vulnerability Scanner (PVS): Providing continuous network monitoring and assessment with real-time visibility into all network activity. Tenable's PVS determines server and client-side application vulnerabilities and sends this data to the SecurityCenter in real time. It also uses advanced protocol analysis to log all file sharing, SQL, HTTP, and other types of protocols for analysis.
https://www.tenable.com/press-releases/tenable-network-security-named-assured-compliance-assessment-solution-for-the-defense
0

Featured Post

What Should I Do With This Threat Intelligence?

Are you wondering if you actually need threat intelligence? The answer is yes. We explain the basics for creating useful threat intelligence.

Join & Write a Comment

Nothing in an HTTP request can be trusted, including HTTP headers and form data.  A form token is a tool that can be used to guard against request forgeries (CSRF).  This article shows an improved approach to form tokens, making it more difficult to…
Never store passwords in plain text or just their hash: it seems a no-brainier, but there are still plenty of people doing that. I present the why and how on this subject, offering my own real life solution that you can implement right away, bringin…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
In this seventh video of the Xpdf series, we discuss and demonstrate the PDFfonts utility, which lists all the fonts used in a PDF file. It does this via a command line interface, making it suitable for use in programs, scripts, batch files — any pl…

743 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now