wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Vulnerability Assessment

profile
17_Priyanka Hadpad
Aug 17, 2022
0 Likes
0 Discussions
100 Reads

Vulnerability:

vulnerability in networking are the security weeknesses or loop holes that gives threats the opportunity to compromises assests, like software, hardware, or organizational processes can result in a security breach.

 

Types of vulnerability:

 

Hardware:

Outdated Computer: The problem with old outdated computers is that a lot of it's equipment doesn't have built-in security features, self-healing basic input/output system (BIOS), preboot authentication, self-encrypting drivers and the like.

Old routers: Routers that manufactured in 2011 and earlier- can have serious vulnerabilities.

Drivers that don't self-encrypt: Self encrypt drivers requires a password in addition to the OS login password, and the technology automatically encrypts and decrypts data on the drive. 

 

Software:

Unpatched or out-of-date Operating systems: The OS that does not have automatic updates or technical assistance, latest security updates and the OS that has fewer security features than more modern OSes are prone to attack easier.

Malicious code: A common vulnerability is the potential for remote code execution when a user opens or previews a maliciously prepared files or visits a website containing content that exploits the vulnerability. 

Missing or weak Authorization Credentials: A common tactic that attackers use is to gain access to systems and networks through brute force like guessing employee credentials. That is why it is crucial that employees be educated on the best practices of cybersecurity so that their login credentials are not easily exploited.

Social engineering attacks: Social engineering attack that fool users into giving up personal information such as a username or password.

 

Vulnerability assessments Life Cycle:

 

 

  • Creating Baseline: In this phase it will find out the details of hosts, network, application and other open services. It maps the infrastructure, learns about security controls, policies, and standards followed by organizations. Basline helps to plan the process, schedule the tasks, and manage then with respect to priorty.
  • Vulnerability Assessment: In this phase it collect all founded or detected vulnerabilities of the system, vulnerabilities scope and priorities.
  • Risk Assessment: Here it defines the impact of vulnerabilities to an organization.
  • Remediation:  Here prioritize and fix vulnerabilities in order according to business risk. High priority vulnerabilities are addressed first because they can cause a huge impact.
  • Verification: Here verifying that all vulnerabilities have been eliminated on organizations.
  • Monitor: The end always must monitoring the network and system to avoid unsuspected attacks.

 

 


Comments ()


Sign in

Read Next

american greatines

Blog banner

Real-Time Operating Systems (RTOS) Deep Explanation

Blog banner

Deadlock

Blog banner

How Does SSO Works

Blog banner

Drawing tips for a beginner

Blog banner

?What Children Learn Between Activities: The Hidden Learning Moments in a Preschool Day

Blog banner

Virtual memory

Blog banner

Google

Blog banner

SMARTSHEET

Blog banner

A book review

Blog banner

Decoding Confusion Matrix

Blog banner

Swiggi

Blog banner

Hypothesis Testing in Data Science

Blog banner

The Rich Heritage Of Patola Sarees: Gujarat’s Timeless Weaving Art

Blog banner

All you need to know about Website Traffic

Blog banner

memory management

Blog banner

Trello ( management software)

Blog banner

Introduction to Solidity Programming for Blockchain Development

Blog banner

Beyond the Track: Why the Best Hotel in Arcadia, Florida, Completes Your IMSA Sebring Getaway

Blog banner

"The Benefits of Using GIS in Agriculture"

Blog banner

Denial-of-Service and Distributed Denial-of-Service Attack Techniques

Blog banner

Article on different management system

Blog banner

Steps to create an Ubuntu EC2 Instance with GUI in AWS

Blog banner

SMARTSHEET MANAGEMENT SYSTEM

Blog banner

PPC Advertising and its Impressive Benefits

Blog banner

MACHINE LEARNING

Blog banner

LEMON PICKLE SWEET AND MILD HOT

Blog banner

PYTHON

Blog banner

Raising Emotionally Intelligent Students: The Classroom Beyond Academics

Blog banner

Pipedrive

Blog banner

Philadelphia Experiment : Was it real?

Blog banner

Yoga in INDIA and ABROAD

Blog banner

Data Exfiltration

Blog banner

SQL Injection

Blog banner

Street foods

Blog banner

Uniprocessor scheduling

Blog banner

Banaras

Blog banner

GIS

Blog banner

MODERN OPERATING SYSTEMS

Blog banner

Benefits of Yoga

Blog banner

Regression Analysis

Blog banner

Linux VServer Architecture

Blog banner