wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Vulnerability Assessment (Vulnerability Analysis)

profile
45_Amulya Yadla
Sep 14, 2023
0 Likes
0 Discussions
122 Reads

What is a vulnerability assessment?

 

- A vulnerability assessment is the process of defining, identifying, classifying and prioritizing vulnerabilities in computer systems, applications, and network infrastructures.

- Vulnerability assessments also provide an organization with the necessary knowledge, awareness and risk backgrounds to understand and react to threats to its environment.

- A vulnerability assessment process is intended to identify threats and the risks they pose. They typically involve the use of automated testing tools, such as network security scanners, whose results are listed in a vulnerability assessment report.

 

Importance of vulnerability assessments

 

- A vulnerability assessment provides an organization with details on any security weaknesses in its environment. It also provides direction on how to assess the risks associated with those weaknesses. This process offers the organization a better understanding of its assets, security flaws, and overall risk, reducing the likelihood that a cybercriminal will breach its systems and catch the business off guard.

 

 

Types of Vulnerability Assessments

 

  • Network-based scans are used to identify possible network security attacks. This type of scan can also detect vulnerable systems on wired or wireless networks.
  • Host-based scans are used to locate and identify vulnerabilities in servers, workstations or other network hosts. This type of scan usually examines ports and services that may also be visible to network-based scans. However, it offers greater visibility into scanned systems' configuration settings and patch history, even legacy systems.
  • Wireless network scans of an organization's Wi-Fi networks usually focus on points of attack in the wireless network infrastructure. In addition to identifying rogue access points a wireless network scan can also validate that a company's network is securely configured.
  • Application scans test websites to detect known software vulnerabilities and incorrect configurations in network or web applications.
  • Database scans can identify weak points in a database to prevent malicious attacks, such as SQL injection attacks.

 

 

Vulnerability Assessment Process

 

1. Goals and Objective: Define the goals and objectives of Vulnerability Analysis.

 

2. Scope: While performing the Assessment and Test, the assignment's Scope needs to be clearly defined. The following are the three possible scopes that exist, such as:

 

- Black Box Testing: It is a software testing method in which software applications' functionalities are tested without knowing the internal code structure, implementation details, and internal paths.
Black Box Testing mainly focuses on the input and output of software applications, and it is entirely based on software requirements and specifications. It is also known as Behavioral Testing.

 

- White Box Testing: White box testing is a software testing technique in which internal structure, design and coding of software are tested to verify the flow of input-output and also improve design, usability and security.
In white-box testing, code is visible to testers, so it is also called Clear box testing, Open box testing, transparent box testing, Code-based testing, and Glass box testing.

 

- Grey Box Testing: It is a software testing technique to test a software product or application with partial knowledge of its internal structure. The purpose of grey box testing is to search and identify the defects due to improper code structure or improper applications.
In this process, context-specific errors that are related to web systems are commonly identified. It increases the testing coverage by concentrating on all of the layers of any complex system

 

3. Information Gathering: Obtaining as much information about the IT environment, such as Networks, IP Address, Operating System Version, etc. It applies to all three types of Scopes, such as Black Box Testing, White Box Testing, and Grey Box Testing.

 

4. Vulnerability Detection: In this step, vulnerability scanners scan the IT environment and identify the vulnerabilities.

 

5. Information Analysis and Planning: It will analyze the identified vulnerabilities to devise a plan for penetrating the network and systems

 

How to do Vulnerability Assessment

Step 1) Setup: We need to start by determining which systems and networks will be assessed, identifying where any sensitive data resides, and which data and systems are most critical. Configure and update the tools.

 

Step 2) Test Execution: A packet is the data routed unit between an origin and the destination. When any file, such as an e-mail message, HTML file, Uniform Resource Locator (URL) request is sent from one place to another on the internet, the TCP layer of TCP/IP divides the file into several "chunks" for efficient routing. Each of these chunks will be uniquely numbered and will include the Internet address of the destination. These chunks are called packets

 

Step 3) Vulnerability Analysis: Now define and classify network or System resources and assign priority to the resources (low, medium, high). Identify potential threats to each resource and develop a strategy to deal with the most prioritized problems. Define and implement ways to minimize the consequences if an attack occurs.

 

Step 4) Remediation: The vulnerability assessment results to patch key flaws or problems, whether simply via a product update or through something more involved, from installing new security tools to an enhancement of security procedures.

 

Step 5) Repeat: Vulnerability assessments need to be conducted regularly, monthly or weekly, as any single assessment is only a report of that moment in time. These reports give a strong sense of how security posture has developed.

 


Comments ()


Sign in

Read Next

Palm Vein Biometric Technology; Contactless vein authentication

Blog banner

Modern Operating System

Blog banner

Virtual Memory

Blog banner

Dr. Venkadavarahan

Blog banner

Random Forests

Blog banner

SECURITY TOOLS

Blog banner

Major achievement

Blog banner

Modern Operating Systems

Blog banner

Article on different management system

Blog banner

"Life as a Part-time Student"

Blog banner

Cyber Laws In India and Around the World

Blog banner

A BLOG ON MYSQL

Blog banner

Virtualization

Blog banner

virtual machine

Blog banner

Explain Kernel in OS

Blog banner

What are Tenders its various types

Blog banner

The Importance of Data Quality Management in Data Science

Blog banner

Study on cyber and network forensic in computer security management

Blog banner

Top 5 Benefits of Artificial Intelligence

Blog banner

Senseless Teeths

Blog banner

Interesting fact about kangaroo.

Blog banner

Odoo

Blog banner

SQL Injection practice on DVWA

Blog banner

Odoo

Blog banner

Sweet and Sour Mango Pickle (Gol Keri)

Blog banner

IP ADDRESS

Blog banner

Deadlock

Blog banner

Fault Tolerance

Blog banner

Risk factors in service transistion

Blog banner

Exploring Virtual Machines and Computer Forensic Validation Tools

Blog banner

Evolution of Operating system

Blog banner

JIRA SOFTWARE

Blog banner

Cloud Computing: Threats and Vulnerabilities

Blog banner

DEVELOPMENTS LEADING TO MODERN OPERATING SYSTEMS

Blog banner

What is Influencer Marketing and its Trends

Blog banner

CONCURRENCY: MUTUAL EXCLUSION AND SYNCHRONIZATION-het karia

Blog banner

Why Does Hierarchy Still matter in Organizations?

Blog banner

10 Signs That Prove YOU are his FIRST priority.

Blog banner

Deadlock in Operating systems

Blog banner

AutoML: The Future of Automated Data Science

Blog banner

Incorporating Automation into Digital Forensics.

Blog banner

Deadlock

Blog banner