wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Vulnerability Assessment

profile
17_Priyanka Hadpad
Aug 17, 2022
0 Likes
0 Discussions
100 Reads

Vulnerability:

vulnerability in networking are the security weeknesses or loop holes that gives threats the opportunity to compromises assests, like software, hardware, or organizational processes can result in a security breach.

 

Types of vulnerability:

 

Hardware:

Outdated Computer: The problem with old outdated computers is that a lot of it's equipment doesn't have built-in security features, self-healing basic input/output system (BIOS), preboot authentication, self-encrypting drivers and the like.

Old routers: Routers that manufactured in 2011 and earlier- can have serious vulnerabilities.

Drivers that don't self-encrypt: Self encrypt drivers requires a password in addition to the OS login password, and the technology automatically encrypts and decrypts data on the drive. 

 

Software:

Unpatched or out-of-date Operating systems: The OS that does not have automatic updates or technical assistance, latest security updates and the OS that has fewer security features than more modern OSes are prone to attack easier.

Malicious code: A common vulnerability is the potential for remote code execution when a user opens or previews a maliciously prepared files or visits a website containing content that exploits the vulnerability. 

Missing or weak Authorization Credentials: A common tactic that attackers use is to gain access to systems and networks through brute force like guessing employee credentials. That is why it is crucial that employees be educated on the best practices of cybersecurity so that their login credentials are not easily exploited.

Social engineering attacks: Social engineering attack that fool users into giving up personal information such as a username or password.

 

Vulnerability assessments Life Cycle:

 

 

  • Creating Baseline: In this phase it will find out the details of hosts, network, application and other open services. It maps the infrastructure, learns about security controls, policies, and standards followed by organizations. Basline helps to plan the process, schedule the tasks, and manage then with respect to priorty.
  • Vulnerability Assessment: In this phase it collect all founded or detected vulnerabilities of the system, vulnerabilities scope and priorities.
  • Risk Assessment: Here it defines the impact of vulnerabilities to an organization.
  • Remediation:  Here prioritize and fix vulnerabilities in order according to business risk. High priority vulnerabilities are addressed first because they can cause a huge impact.
  • Verification: Here verifying that all vulnerabilities have been eliminated on organizations.
  • Monitor: The end always must monitoring the network and system to avoid unsuspected attacks.

 

 


Comments ()


Sign in

Read Next

World’s rarest passport owned by 500 people.

Blog banner

Ubiquitous Computing

Blog banner

Is it important to follow all the trends that come up on social media?

Blog banner

ARTICLE ON WRIKE CORPORATION

Blog banner

What is the point of living if we can die at any moment of our lives ?

Blog banner

Key to success in Sports

Blog banner

MIDDLE CLASS MELODIES!!

Blog banner

Penetration Testing

Blog banner

Self managing devices

Blog banner

Survey of Which Movies Types people are Prefer to Watch in India.

Blog banner

Krishna Rao SAP ID--53003230076

Blog banner

GEOLOGY AND GEO-TECTONIC FRAME WORK OF WESTERN BASTAR CRATON

Blog banner

Memory Management

Blog banner

Lemon and Chilli Pickle (Limbu Mirchi Achar)

Blog banner

What is Packet Filtering?

Blog banner

PHONE TECHNOLOGY

Blog banner

Platonic Solids

Blog banner

What is Spyware? and examples of them.

Blog banner

John Titor: The Time Traveler

Blog banner

Tea, Coffee, Red Wine, and Teeth: A Stain Survival Guide

Blog banner

Animal’s have my heart

Blog banner

Improving the Accuracy of GPS and GNSS

Blog banner

Types Of scheduling

Blog banner

Deadlock and Starvation

Blog banner

child Labour

Blog banner

Binary Search Tree (BST) in Data Structure

Blog banner

LIFEHACKER

Blog banner

Computer Forensics and its Impact in Business Environment

Blog banner

Process State

Blog banner

What is thread and alse multithreading

Blog banner

Concept and definition of m-commerce

Blog banner

GIS Bharat Maps

Blog banner

Full Disk Encryption

Blog banner

Direct Memory Access

Blog banner

Dudhasagar waterfall ?

Blog banner

Data Mining

Blog banner

MY MOST THRILLED TREK ..... BHAIRAVGAD

Blog banner

Kernel in Operating System

Blog banner

Security Breaches in Stock market trading

Blog banner

Concurrency management in operating systems

Blog banner

Health and fitness in technology

Blog banner

MACHINE LEARNING

Blog banner