Vulnerability Scanning Concepts Flashcards
Uses automated vulnerability scanner and observes reports and findings. Does not take down systems, apps or services and does not disrupt business.
Passively test security controls.
Understanding common attacks and taking inventory of vulnerabilities –scanners report missing updates, misconfigured security settings and known exploits
Identify vulnerability
Vulnerability scanners can identify missing patches or antivirus
Identify lack of security controls
Weak passwords, default usernames and passwords, and open ports.
Identify common misconfigurations
can interrupt service, us much more detailed, and exploits vulnerabilities.
Intrusive testing
Passive does not exploit vulnerabilities and does not disrupt service.
Non-intrusive testing
Done though it is inside the network and emulates an insider attack.
Credentialed
A result that shows incorrectly that a condition or attribute is present. – false vulnerability
False positive
Done as though it is outside the network and emulates an outside attack – shows what would be found if the network was scanned
Non-credentialed