Chapter 3

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 14

Chapter 3

• Vulnerability Assessment
• 1. Types of Vulnerability Assessments
• 2. Network-based scans
• 3. Host-based scans
• 4. Wireless network scans
• 5. Application Scans
• 6. Database Scans
Vulnerability scanning or vulnerability
assessment
• It is a way of identifying the gaps in the security of your website,
application, or network.
• The process is meant to find common, publicly recognized
vulnerabilities in your system before the hackers do the same and
exploit those vulnerabilities.
Types of Vulnerability Scanning
1. Host-based vulnerability scanning

• As you may be aware, a host is a device on a TCP/IP network that


connects with other devices, sends and receives data.
• It has the ability to provide access to a network through a user
interface, specialized software, among other means.
• In the open systems interconnection model, the host communicates
with other hosts with transport layers protocols.
• For companies with a website, the host is a web server that stores
and transmits data. If the company uses cloud hosting, then multiple
servers located at different locations are responsible for the
functionality of their website.
• Similarly, there are other virtual hosts and remote hosts.
What is host-based security?

• Host-based security refers to the creation of a perimeter around each


user workstation, server, or other network hosts, that interact with
the IT network.
• It means installing firewalls and intrusion prevention systems and
patching up software on a regular basis to avoid vulnerabilities.
• host-based security not only prevents a host from being infected but
also ensures that if a host is infected, it doesn’t spread the infection
across the neighboring hosts.
What is host-based vulnerability scanning?

• Host-based vulnerability scanning is the process of scanning a


network host for security loopholes. A scan of this kind can reveal 
• The history of security patches in said host
• Vulnerabilities incurred through outdated patches
• The damage that can be caused by the detected vulnerabilities
• The level of access a hacker can gain by infecting the said host
• Possible ways of mitigating the situation.
Network Scanning

• This is one of the most vital among all the vulnerability scanning types. 
Network vulnerability scanning is the process of identifying the security
vulnerabilities in an organization’s network infrastructure.
• What does network vulnerability scanning entail?
• It Identifies all systems and devices operating in your network infrastructure
• Then it determines how the different devices and systems are connected
• After preparing an inventory of all the devices and systems under consideration,
the scanner analyzes the said assets to detect common vulnerabilities.
• Then it scans for exploitable ports and services
• It identifies the weak passwords and authentication errors
3. Database vulnerability scanning

• The ultimate goal of most malicious actors is to get access to the


database where you store all sensitive information.
• Hence, the importance of securing databases is immense.
• Database security involves multiple measures taken to ensure
confidentiality, integrity, and availability of databases along with the
database management systems. 
• A hacked database can be devastating for a business as it impacts
business continuity, brand value, finances, intellectual property, and
may incur fines and penalties.
What is a database vulnerability scanner?

• A database vulnerability scanner is a tool specially designed for


scanning your database for vulnerabilities like faulty security
configuration, and lack of encryption.
• Database vulnerability scanning helps you evaluate the overall data
security health of your organization, detect vulnerabilities, and
mitigate them before they are exploited by hackers. 
4. Cloud vulnerability scanning
• The process of scanning a cloud deployment for common vulnerabilities is called
cloud vulnerability scanning.
• Cloud vulnerability scanning is a part of the holistic cloud security strategy that can be
implemented to monitor, manage, and improve the overall security of cloud
infrastructure.
• What are some cloud-related vulnerabilities?
• Server misconfigurations such as misconfigured S3 buckets are one of the most
common cloud vulnerabilities.
• Using weak passwords can expose your cloud accounts to brute force attacks.
• SQLi, XSS, and CSRF bugs are quite common in cloud-based applications, and they can
be exploited easily by hackers.
• Running outdated, unpatched software on your cloud platform can compromise the
cloud services.
5. Application Vulnerability Assessment
• Application vulnerability scanning is one of the most widely used
vulnerability scanning types. It involves scanning your web apps and mobile
apps for security vulnerabilities. 
• Both web applications and mobile applications are updated with new
features on a regular basis.
• New vulnerabilities may creep in with each new code update. That aside, an
application needs various external components like themes and plugins to
function properly.
• These external components may also incur exploitable vulnerabilities.
• It is essential to incorporate a security regime in your application
development lifecycle and an application vulnerability scanner plays a vital
role in it.
Application vulnerability assessment helps you assess –

• The current state of security of your application


• The existing vulnerabilities and the risk posed by them
• The amount of potential damage caused by the vulnerabilities.
What is authenticated and unauthenticated vulnerability
scanning?

• In the case of an authenticated scan, the scanner is configured with


credentials to conduct the scan on the privilege level granted to
authenticated users.
• In simpler terms, the authenticated vulnerability scanner can scan
behind the logged-in pages. We can also call it an internal
vulnerability scan.  
• An unauthenticated scanner scans for perimeter threats from the
point of view of an outsider as it does not have privileged access. This
is also called an external vulnerability scan. 

You might also like