Vulnerability Types

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 10

NETWORK MANAGEMENT AND SECURITY

PRESENTATION TOPIC:
VULNERABILITY TYPES

BODJE N’KAUH NATHAN-REGIS , 1035001


M.PHIL COMPUTER SCIENCE, CHRIST UNIVERSITY
INTRODUCTION
Since the recent cyber attacks of China against the mighty
Google, it is the security of all networks computer which is
compromised.
The case of Google sheds light on what attacker can do in
terms of espionage and infiltration of corporate networks.

Many companies now use antivirus software, intrusion-


detection systems, and firewalls; but hackers and worms
still infiltrate business-technology systems and cause
serious damage.
I- DEFINITION

Any computer connected to a network computer is


potentially vulnerable to attack.

In network security, vulnerability is a weakness in a


network system that allows an attacker to undermine the
integrity of this system, its normal operation,
confidentiality and integrity of the data it contains.

Vulnerability is the susceptibility to attack, be exposed to


injury.
II- THREAT + VULNERABILITY = RISK
Any network contains vulnerabilities. Vulnerability can be
qualitatively defined in three levels: Low, Medium, and
High.
 Low vulnerability: The vulnerability poses a level of risk to the
organization; however, it is unlikely to occur. Action to remove
the vulnerability should be taken if possible but the cost of this
action should be weighed against the small reduction in risk.

 Medium vulnerability: The vulnerability poses a significant


level of risk to the confidentiality, integrity, availability, and/or
accountability of the organization’s information, systems, or
physical sites. There is a real possibility that this may occur.
Action to remove the vulnerability is advisable.

 High vulnerability: The vulnerability poses a real danger to


the confidentiality, integrity, availability, and/or accountability of
the organization’s information, systems, or physical sites. Action
should be taken immediately to remove this vulnerability..
III- IDENTIFYING VULNERABILITIES
Identifying specific vulnerabilities begin by locating all the
entry points to the organization. In other words, find all
the access points to information (in both electronic and
physical form) and systems within the organization. This
means identifying:
1- Internet connections
2- Remote access points
3- Connections to other organizations
4- Physical access to facilities
5- User access points
6- Operating systems and applications
IV- VULNERABILITY CATEGORIES
Vulnerabilities can be broken down into the following categories:
Software, Hardware, Configuration, Policy, and Usage.

 Software Vulnerabilities: Software vulnerability is some defect


(commonly called a "bug") in software which may allow a third party
or program to gain unauthorized access to some resource. The errors
in code are estimates of between 5 and 15 errors for every 1000 lines.

 Hardware Vulnerabilities: Because of the increase of programmable


hardware in the market, Hardware vulnerabilities are increasing in
significance. Vulnerabilities in the system basic input/output system
(BIOS), network processors, and CPUs could do potentially more
damage because hardware vulnerability is often not easily remedied
by a software patch.
 Configuration Vulnerabilities: Misconfigurations are very common
on a network. Unprotected network communication lines and
insecure network architecture. Firewall access control policy, router
configuration ... One of the easiest ways to avoid configuration
errors is to ensure that your security technologies are easy to
manage.

 Policy Vulnerabilities: Policy vulnerabilities occur when an attack


is made possible by a poor choice in the development or
implementation of a security policy. Lack of regular audits.

 Usage Vulnerabilities: Usage vulnerabilities occur when a user


(usually through inexperience, not malice) violates the security
policy and causes vulnerability in the network.
V- COUNTERMEASURES
For each access point within an organization, countermeasures
should be identified. Countermeasures may include :
- Firewalls
- Anti-virus software
- Access controls
- Two-factor authentication systems
- Badges
- Biometrics
- Card readers for access to facilities
- Guards
- File access controls
- Conscientious, well-trained employees
VI- RESUME
Vulnerability provides the entry gate for computer attacks.
Vulnerabilities persist for a number of reasons, including poor
security practices and procedures, inadequate training for
individuals responsible for network security, and software
products of poor quality. As viruses, worms, and hackers continue
to plague business-technology systems, companies must turning
to knowing their systems vulnerabilities to avert attacks.

References :
-Network Security Architectures By Sean Convery
- http://en.wikipedia.org/wiki/Vulnerability_(computing)
- http://en.wikipedia.org/wiki/Vulnerability_management
- http://computer.yourdictionary.com

You might also like