wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Vulnerability Assessment (Vulnerability Analysis)

profile
45_Amulya Yadla
Sep 14, 2023
0 Likes
0 Discussions
122 Reads

What is a vulnerability assessment?

 

- A vulnerability assessment is the process of defining, identifying, classifying and prioritizing vulnerabilities in computer systems, applications, and network infrastructures.

- Vulnerability assessments also provide an organization with the necessary knowledge, awareness and risk backgrounds to understand and react to threats to its environment.

- A vulnerability assessment process is intended to identify threats and the risks they pose. They typically involve the use of automated testing tools, such as network security scanners, whose results are listed in a vulnerability assessment report.

 

Importance of vulnerability assessments

 

- A vulnerability assessment provides an organization with details on any security weaknesses in its environment. It also provides direction on how to assess the risks associated with those weaknesses. This process offers the organization a better understanding of its assets, security flaws, and overall risk, reducing the likelihood that a cybercriminal will breach its systems and catch the business off guard.

 

 

Types of Vulnerability Assessments

 

  • Network-based scans are used to identify possible network security attacks. This type of scan can also detect vulnerable systems on wired or wireless networks.
  • Host-based scans are used to locate and identify vulnerabilities in servers, workstations or other network hosts. This type of scan usually examines ports and services that may also be visible to network-based scans. However, it offers greater visibility into scanned systems' configuration settings and patch history, even legacy systems.
  • Wireless network scans of an organization's Wi-Fi networks usually focus on points of attack in the wireless network infrastructure. In addition to identifying rogue access points a wireless network scan can also validate that a company's network is securely configured.
  • Application scans test websites to detect known software vulnerabilities and incorrect configurations in network or web applications.
  • Database scans can identify weak points in a database to prevent malicious attacks, such as SQL injection attacks.

 

 

Vulnerability Assessment Process

 

1. Goals and Objective: Define the goals and objectives of Vulnerability Analysis.

 

2. Scope: While performing the Assessment and Test, the assignment's Scope needs to be clearly defined. The following are the three possible scopes that exist, such as:

 

- Black Box Testing: It is a software testing method in which software applications' functionalities are tested without knowing the internal code structure, implementation details, and internal paths.
Black Box Testing mainly focuses on the input and output of software applications, and it is entirely based on software requirements and specifications. It is also known as Behavioral Testing.

 

- White Box Testing: White box testing is a software testing technique in which internal structure, design and coding of software are tested to verify the flow of input-output and also improve design, usability and security.
In white-box testing, code is visible to testers, so it is also called Clear box testing, Open box testing, transparent box testing, Code-based testing, and Glass box testing.

 

- Grey Box Testing: It is a software testing technique to test a software product or application with partial knowledge of its internal structure. The purpose of grey box testing is to search and identify the defects due to improper code structure or improper applications.
In this process, context-specific errors that are related to web systems are commonly identified. It increases the testing coverage by concentrating on all of the layers of any complex system

 

3. Information Gathering: Obtaining as much information about the IT environment, such as Networks, IP Address, Operating System Version, etc. It applies to all three types of Scopes, such as Black Box Testing, White Box Testing, and Grey Box Testing.

 

4. Vulnerability Detection: In this step, vulnerability scanners scan the IT environment and identify the vulnerabilities.

 

5. Information Analysis and Planning: It will analyze the identified vulnerabilities to devise a plan for penetrating the network and systems

 

How to do Vulnerability Assessment

Step 1) Setup: We need to start by determining which systems and networks will be assessed, identifying where any sensitive data resides, and which data and systems are most critical. Configure and update the tools.

 

Step 2) Test Execution: A packet is the data routed unit between an origin and the destination. When any file, such as an e-mail message, HTML file, Uniform Resource Locator (URL) request is sent from one place to another on the internet, the TCP layer of TCP/IP divides the file into several "chunks" for efficient routing. Each of these chunks will be uniquely numbered and will include the Internet address of the destination. These chunks are called packets

 

Step 3) Vulnerability Analysis: Now define and classify network or System resources and assign priority to the resources (low, medium, high). Identify potential threats to each resource and develop a strategy to deal with the most prioritized problems. Define and implement ways to minimize the consequences if an attack occurs.

 

Step 4) Remediation: The vulnerability assessment results to patch key flaws or problems, whether simply via a product update or through something more involved, from installing new security tools to an enhancement of security procedures.

 

Step 5) Repeat: Vulnerability assessments need to be conducted regularly, monthly or weekly, as any single assessment is only a report of that moment in time. These reports give a strong sense of how security posture has developed.

 


Comments ()


Sign in

Read Next

Why we fail after giving 100% ?

Blog banner

How Unstructured Play Helps Children Become Creative Thinkers

Blog banner

Decoding the Weave — How to Identify Original Patola Art on a Fabric

Blog banner

Principal of concurrency

Blog banner

TRIGGERS IN DATABASE

Blog banner

Direct Memory Access

Blog banner

Health and fitness in technology

Blog banner

The evolution of OS

Blog banner

5 Powerful Mindset Shifts To Make 2026 Your Breakthrough Year

Blog banner

Compromising Mobile Platforms

Blog banner

bulk email software

Blog banner

DURGA POOJA

Blog banner

Loneliness

Blog banner

How To Invest In Indian Stock Market @ BSE & NSE ~ Tutorial 3

Blog banner

RAID_142

Blog banner

Virtual memory

Blog banner

Data Science in Healthcare: Predicting Diseases

Blog banner

IT security management

Blog banner

Benefits of Yoga

Blog banner

objectives and functions of operating system

Blog banner

What makes Nugget RC Racing Florida’s Most Exciting Racing Events?

Blog banner

What is a Malware ?

Blog banner

My Favorite Country

Blog banner

Improving the Accuracy of GPS and GNSS

Blog banner

MD5 Collisions and the impact on computer forensics

Blog banner

"Games and the future"

Blog banner

Advantage of freedom

Blog banner

Data-Driven Prediction of Virtual Item Prices in Online Games

Blog banner

Web browser forensics:Tools,Evidence collection and analysis

Blog banner

Concurrency management in operating systems

Blog banner

Why Kanye West (Now Ye) is the GOAT: A Legacy Beyond Music

Blog banner

The Future of Cybersecurity: Trends, Challenges, and Strategies

Blog banner

RAID - LEVELS OF RAID

Blog banner

Deadlock

Blog banner

Linux Memory Management

Blog banner

Dental Problems That Start Small But Should Never Be Ignored

Blog banner

INTERNET SECURITY

Blog banner

Festive Ethnic Wear Guide: Patola-Inspired Looks for Every Celebration

Blog banner

Multiprocessor

Blog banner

Fashion design

Blog banner

Virtual Memory

Blog banner

Process Creation

Blog banner