1.7Vulnerability scanning concepts Flashcards
Passively test security controls
Uses an automated vulnerability scanner. Observes and reports findings. Does not take down systems, applications, or services, and doesn’t disrupt business.
Identity Vulnerability
Understanding common attacks and taking inventory of vulnerabilities. scanners can report: missing updates, misconfigured security settings, and known exploits
Identify lack of security controls
Vulnerability scanners can identify a missing patch of antivirus
Identify common misconfigurations
Weak passwords, default usernames and passwords, and open ports.
Intrusive vs. non intrusive
Intrusive testing can interrupt service, is much more detailed, and exploits vulnerabilities. non intrusive is more passive, does not exploit vulnerabilities, and does not disrupt service.
Credentialed vs non credentialed
credentialed are done as though it is inside the network, emulates an insider attacks. Non-credentialed are done as though it is outside the network, emulates an outside attack. Shows what would be found if the network was scanned.
False positive
A result which shows incorrectly that a condition or attribute is present. a false vulnerability