Chapter 10 Vulnerability Assessment and Data Security
Chapter 10 Vulnerability Assessment and Data Security
Vulnerability Assessment
Asset Identification
• Common assets
• People
• Physical assets
• Data
• Hardware
• Software
Threat Evaluation
• Threat evaluation lists potential threats from threat agents, which are
people or things that can carry out a threat against an asset
• Threat modeling aims to understand attackers and their methods by
constructing threat scenarios
• Attack trees provide a visual representation of potential attacks and are
drawn as inverted tree structures
ITT450 Page 1
Vulnerability Appraisal
Risk Assessment
ITT450 Page 2
Risk Mitigation
i. Port Scanners
• TCP/IP communication involves information exchange between programs
on different systems using port numbers as identifiers
• Port numbers are 16 bits long and are divided into three categories: well-
known, registered, and dynamic/private
• Well-known port numbers are for universal applications, registered port
numbers are for other applications, and dynamic/private port numbers
are for any application
• Knowledge of port numbers can be used by attackers to target specific
services
• Port scanner software searches system for port vulnerabilities and
determines port state (open, closed, or blocked)
ii. Protocol Analyzers
• Protocol analyzers are hardware or software that capture packets and
decode and analyze their contents
• Protocol analyzers are also called sniffers
• Protocol analyzers are used by network administrators for
troubleshooting, characterizing network traffic, security analysis, and
fine-tuning the network and managing bandwidth
ITT450 Page 3
fine-tuning the network and managing bandwidth
iii. Vulnerability Scanners
• Vulnerability scanners are products that look for vulnerabilities in
networks or systems
• Vulnerability scanners identify vulnerabilities and alert network
administrators
• There are two types of vulnerability scanners: active and passive
• Passive scanners identify current software OS and applications on the
network and indicate which devices might have a vulnerability
• Vulnerability scanners can alert when new systems are added to the
network and identify which applications and servers host or transmit
sensitive data
iv. Honeypots and Honeynets
• Honeypot is a computer with minimal security and intentional
vulnerabilities
• Honeypot contains fake data files and aims to trick attackers into
revealing their techniques
• Honeynet is a network with one or more honeypots and intentional
vulnerabilities
Vulnerability Scanning
Penetration Testing
Secure Methodology
ITT450 Page 5
• Fail-safe lock locks doors automatically upon failure
• Firewall can be configured in fail-safe or fail-open state
iii. Hardening
• To eliminate security risks
• Types of hardening techniques:
i. Protecting accounts with passwords
ii. Disabling unnecessary accounts
iii. Disabling unnecessary services
iv. Protecting management interfaces and applications
iv. Reporting
• Providing information on events that occur is important for taking action
• Alarms or alerts sound warning if specific situation is occurring (e.g., too
many failed password attempts)
• Reporting can provide information on trends that can indicate a serious
impending situation (e.g., multiple user accounts experiencing multiple
password attempts)
ITT450 Page 6