Chapter 3
Chapter 3
Chapter 3
• Vulnerability Assessment
• 1. Types of Vulnerability Assessments
• 2. Network-based scans
• 3. Host-based scans
• 4. Wireless network scans
• 5. Application Scans
• 6. Database Scans
Vulnerability scanning or vulnerability
assessment
• It is a way of identifying the gaps in the security of your website,
application, or network.
• The process is meant to find common, publicly recognized
vulnerabilities in your system before the hackers do the same and
exploit those vulnerabilities.
Types of Vulnerability Scanning
1. Host-based vulnerability scanning
• This is one of the most vital among all the vulnerability scanning types.
Network vulnerability scanning is the process of identifying the security
vulnerabilities in an organization’s network infrastructure.
• What does network vulnerability scanning entail?
• It Identifies all systems and devices operating in your network infrastructure
• Then it determines how the different devices and systems are connected
• After preparing an inventory of all the devices and systems under consideration,
the scanner analyzes the said assets to detect common vulnerabilities.
• Then it scans for exploitable ports and services
• It identifies the weak passwords and authentication errors
3. Database vulnerability scanning