Unit III
Unit III
Unit III
• A vulnerability scan is a security assessment
process that involves identifying and
assessing vulnerabilities in computer
systems, networks, applications, or other
information technology assets.
• The primary goal of a vulnerability scan is to
discover potential weaknesses in a system's
security posture before they can be
exploited by malicious actors
Below are some key aspects of vulnerability
scanning
Compliance
Regular
False Positives Reporting and Risk
Scanning
Management
Penetration Patch
Testing Management
• Vulnerability scanning is a fundamental component of
a robust cybersecurity strategy. It helps organizations
proactively identify and mitigate security weaknesses,
reducing the risk of data breaches and cyberattacks.
• However, it's important to remember that
vulnerability scanning is just one part of a
comprehensive security program, and organizations
should combine it with other security measures to
protect their systems effectively.
Plan the
vulnerability scan
• Planning a vulnerability scan is a crucial step
to ensure its effectiveness and minimize
disruptions to your organization's operations
Below is a step-by-step plan to help you
conduct a vulnerability scan
Define
Gain Select a Configure the
Objectives and Asset Inventory
Authorization Scanning Tool Scanning Tool
Scope
Review Legal
Define Scan Schedule the Analyze the
and Ethical Run the Scan
Parameters Scan Results
Considerations
Follow-Up Continuous
Documentation
Scans Improvement
Scanning Tools
• There are numerous vulnerability scanning tools available,
ranging from open-source solutions to commercial products.
• The choice of tool often depends on your specific needs,
budget, and the complexity of your IT environment.
Nessus
OpenVAS (Open Vulnerability Assessment System)
Here are
Qualys
Nexpose
some Acunetix
popular
Burp Suite
Retina
tools: Tenable.io
Microsoft Baseline Security Analyzer (MBSA):
Wireshark
OpenVAS-Client
• When selecting a vulnerability scanning tool, consider factors
like the size and complexity of your network, the types of
systems and applications you're scanning, the level of
automation required, and your budget constraints.
• It's often a good practice to combine multiple tools to cover
different aspects of vulnerability assessment, such as network
scanning, web application scanning, and host-level scanning,
to ensure comprehensive security coverage.
Vulnerability scans come in various types,
each designed to assess different aspects
of your IT environment.
Types of
scans The choice of scan type depends on your
specific objectives and the areas of your
system or network you want to evaluate.
Here are some common types of scans:
Network Scanning Host-Level Scanning Web Application
• Port Scanning • Operating System Detection Scanning Wireless Network
• Ping Scanning • Service and Version • Web Application Scanning: Database Scanning:
Scanning
Detection • Crawl and Audit: