1: 7 Vulnerability Scanning Flashcards
What are the four steps of the vulnerability patching process?
1) Company learns of vulnerability
2) Developers analyze issue and develop patch
3 Company releases patch to customers
4) Customers apply patch to remediate vulnerability
Vulnerability Management
Detects, remediates, and reports vulnerabilities
What are the different types of vulnerability requirements an organization must follow?
Corporate policy, regulatory requirements, system security
PCI DSS
Credit Card Management requirement documentation
FISMA - NIST 853
Government requirement documentation
Network Vulnerability Scan
Probes devices for security issues
Application Scan
Tests code running on an organization’s devices
Web Application Scan
Probes for risks such as SQL injection
What is the best way to assess an organization’s vulnerabilties?
Pairing scans with configuration and log reviews
What are the three ways to prioritize assets to be scanned?
Impact, Likelihood, Criticality
Impact
Highest data classification handled by system
Likelihood
Network exposure, what services are exposed to outside world
Criticality
Impact the system has on business operations
What are the ways an organization can configure a vulnerability scan
Target applications, schedule for certain groups, configure types of network pings, target ports, protocols to follow, testing accuracy
What is a vulnerability scan plugin
The ability to test for one specific vulnerability.