1.5 Vulnerability Concepts (Chapter 8) Flashcards
evaluates everything needed to produce and sell a product
supply chain assessment
used to gain information about remote systems and many network scanners using it
banner grabbing
what command line tools can be used for banner grabbing?
netcat, telnet, nmap, zenmap
active test that can assess deployed security controls and determine impact of a threat
penetration test
this test starts with a vulnerability scan and then tries to exploit vulnerabilities by actually attacking or simulating an attack
penetration test
when testers use known methods to exploit a vulnerability
initial exploitation
logging information on what users do
usage auditing
rights and permissions assigned to users and helps ensure least privilege is enforced
permission auditing review