ch 13 Flashcards
A systematic and methodical evaluation of the security posture of the enterprise
It examines the exposure to attackers, forces of nature, and any potentially harmful entity
Vulnerability Assessment
Process of inventorying items with economic value
Asset identification
List potential threats that come from threat agents
Threat evaluation
Goal: understand attackers and their methods
Often done by constructing threat scenarios
Threat modeling
Provides visual representation of potential attacks
Drawn as an inverted tree structure
Attack tree
Determine current weaknesses
Takes a snapshot of current organization security
Every asset should be viewed in light of each threat
Vulnerability appraisal
Determine damage that would result from an attack
Assess the likelihood that the vulnerability is a risk to organization
Risk assessment
Determine what to do about risks
Determine how much risk can be tolerated
Risk mitigation
Tool available to perform vulnerability assessments:
• Vulnerability Assessment Tools
Involves information exchange between one system’s program and another system’s corresponding program
T C P/I P communication
A unique identifier for applications and services
16 bits in length
• Port number
Searches system for port vulnerabilities
Used to determine port state
Open, closed, or blocked
Port scanner software
Hardware or software that captures packets to decode and analyze contents
Also known as sniffersers
Protocol analyzers
A generic term for a range of products that look for vulnerabilities in networks or systems
Vulnerability scanners
– sends “probes” to network devices and examine the responses received back to evaluate whether a specific device needs remediation
Active scanner
– can identify the current software OS and applications being used on the network and indicate which devices might have a vulnerability
Passive scanner
a computer protected by minimal security
Intentionally configured with vulnerabilities
Contains bogus data files
Honeypot:
a network set up with one or more honeypots
Set up with intentional vulnerabilities
Honeynet
a message that a service transmits when another program connects to it
Banner
when a program is used to intentionally gather this information
Can be used as an assessment tool to perform an inventory on the services and systems operating on a server
Banner grabbing
Intended to break (“crack”) the security of a system
Crackers
(W P A)
Wi-Fi Protected Access
Designed to test the security of a wireless L A N system by attempting to break its protections of Wi-Fi Protected Access (W P A) or W P A 2
Wireless cracker
what does the cmd ping do
tests the network connection between two entities
what does the cmd netstat do
displayed detailed information on the device communicating between each other
what does the cmd tracert
shows the path that a packet takes