wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Vulnerability Assessment

profile
Neha koli
Sep 03, 2022
0 Likes
0 Discussions
198 Reads

What Is Vulnerability Assessment: -

A vulnerability assessment is a systematic review of security weaknesses in an information system.A vulnerability assessment is the process of defining, identifying, classifying and prioritizing vulnerabilities in computer systems, applications and network infrastructure.

Vulnerability assessments also provide an organization with the necessary knowledge, awareness and risk backgrounds to understand and react to threats to its environment.

Examples of threats that can be prevented by vulnerability assessment include:
1 SQL injection, XSS and other code injection attacks.
2 Escalation of privileges due to faulty authentication mechanisms.
3 Insecure defaults – software that ships with insecure settings, such as a 
guessable admin password.

types of vulnerability assessments :-

 Host assessment – The assessment of critical servers, which may be vulnerable to attacks if not adequately tested or not generated from a tested machine image.

 Network and wireless assessment – The assessment of policies and 
practices to prevent unauthorized access to private or public networks and network accessible resources.

 Database assessment – The assessment of databases or big data systems for vulnerabilities and misconfigurations, identifying rogue databases or insecure dev/test environments, and classifying sensitive data across an organization’s infrastructure.

Application scans :– The identifying of security vulnerabilities in web applications and their source code by automated scans on the front-end or static/dynamic analysis of source code.

Vulnerability assessment: - Security scanning process

The security scanning process consists of four steps: testing, analysis, assessment and remediation.

 Vulnerability identification (testing):-
The objective of this step is to draft a comprehensive list of an application’s vulnerabilities. Security analysts test the security health of applications, servers or other systems by scanning them with automated tools, or testing and evaluating them manually.

Analysts also rely on vulnerability databases, vendor vulnerability announcements, asset management systems and threat feeds to identify security weaknesses.
 Vulnerability analysis:-
The objective of this step is to identify the source and root cause of the 
vulnerabilities identified in step one.
It involves the identification of system components responsible for each vulnerability, and the root cause of the vulnerability. For example, the root cause of a vulnerability could be an old version of an open source library. This provides a clear path for remediation – upgrading the library.
 Risk assessment:-
The objective of this step is the prioritizing of vulnerabilities. It involves security 
analysts assigning a rank or severity score to each vulnerability, based on such 
factors as:

1. Which systems are affected.
2. What data is at risk.
3. Which business functions are at risk.
4. Ease of attack or compromise.
5. Severity of an attack.
6. Potential damage as a result of the vulnerability

Remediation:-
The objective of this step is the closing of security gaps. It’s typically a joint effort by security staff, development and operations teams, who determine the most effective path for remediation or mitigation of each vulnerability.
Specific remediation steps might include:
1. Introduction of new security procedures, measures or tools.
2. The updating of operational or configuration changes.
3. Development and implementation of a vulnerability patch

 Vulnerability assessment tools:-
Vulnerability assessment tools are designed to automatically scan for new and 
existing threats that can target your application. Types of tools include:
1. Web application scanners that test for and simulate known attack patterns.
2. Protocol scanners that search for vulnerable protocols, ports and network 
services.
3. Network scanners that help visualize networks and discover warning signals 
like stray IP addresses, spoofed packets and suspicious packet generation from a single IP address.
It is a best practice to schedule regular, automated scans of all critical IT systems. 
The results of these scans should feed into the organization’s ongoing vulnerability 
assessment process.

Vulnerability assessment and WAF(Web application firewall):-
Imperva’s web application firewall helps protect against application vulnerabilities 
in several ways:
1. As a gateway for all incoming traffic, it can proactively filter out malicious 
visitors and requests, such as SQL injections and XSS attacks. This 
eliminates the risk of data exposure to malicious actors.
2. It can perform virtual-patching — the auto-applying of a patch for a newly 
discovered vulnerability at the network edge, giving developers and IT teams 
the opportunity to safely deploy a new patch on the application without 
concern.
3. Our WAF provides a view of security events. Attack Analytics helps 
contextualize attacks and expose overarching threats, 


Comments ()


Sign in

Read Next

The Art of Slow Fashion: Why Patola Defines Sustainable Luxury

Blog banner

Evolution of operating systems

Blog banner

Importance of Network Security Risk

Blog banner

Cache Memory

Blog banner

The Procedural Framework for Corporate High-Tech Investigations

Blog banner

Firewall / IDS Evasion Techniques

Blog banner

Scheduling

Blog banner

10 Unsolved Mysteries all over the world

Blog banner

Raid

Blog banner

Zomato's Secret Digital Marketing Techniques!

Blog banner

Virtual memory

Blog banner

Open Source Project By Google

Blog banner

Concurrency management in operating systems

Blog banner

MACHINE LEARNING

Blog banner

Cross site scripting Attack

Blog banner

Mumbai

Blog banner

TOP 5 GAMING GADGETS (2024)

Blog banner

10 Signs That Prove YOU are his FIRST priority.

Blog banner

The Impact of Tolerances and Wall Thickness on Pipeline Integrity

Blog banner

Linux 94

Blog banner

How covid-19 impacted Social media ad spend forecast globally

Blog banner

RAID

Blog banner

Different Types of Data

Blog banner

THE LEGAL ISSUES OF COMPUTER FORENSICS IN INDIA

Blog banner

Trello ( management software)

Blog banner

Types of Hackers

Blog banner

Key to success in Sports

Blog banner

Use case of K-means clustering

Blog banner

Efficiency of SQL Injection Method in Preventing E-Mail Hacking

Blog banner

Service Strategy In ITSM

Blog banner

Personalized Movie Recommendations with Data Science

Blog banner

10 Survival Tips that might save your life

Blog banner

Fashion design

Blog banner

Modern Operating System

Blog banner

Cloud Computing: Threats and Vulnerabilities

Blog banner

Operating System Objectives and Functions

Blog banner

What Is Experiential Learning and Why Does It Work Better Than Rote Learning?

Blog banner

Threat management

Blog banner

Memory Management

Blog banner

Article on Fresh Book

Blog banner

MODERN OPERATING SYSTEMS

Blog banner

Types of Big Data

Blog banner