12-5 Flashcards
this is another eay to use scanning tool for windows. downloaded from Major Geeks. enables you to monitor all open TCP and UDP ports on the local computer. maps ports to the owning application so you can watch which process has been opened.
Active ports
reports all open TCP/IP and UDP ports and maps them to owning application
Fport
a windows program that will show you detailed listing of all TCP and UDP endpoints on your system including remote address and state of TCP connections.
TCPView
port scanner originally from Foundstone now distributed by McAfee
Superscan
not the most robust vulnerability assessment tool, but it has an easy-to-use interface. you can scan on a machine or many others. prints out a report.
Microsoft baseline security analyzer
offers basic system enumeration
NSA auditor
most popular port scanner out there
NMAP
the most common list of vulnerabilities maintained by the MITRE corporation. its the most common and most comprehensive list. allows security professionals to communicate effectively about vulnerabilities.
CVE ( common Vulnerability Exposures )
maintains a database of vulnerabilities that you can access at NVD. also uses CVE format.
NIST National institute of Standards and Technology
standard for web application security.
owasp
a way of evaluating security of a network, looking at all aspects. it looks at security as a three-dimensional cube. the three dimensions are goals, information states, and safeguards, describe next.
McCumber Cube
three goals of cybersecurity
CIA
information states
storage
transmission
processing
information security safeguards
policy and practices
human factors
technology