Day 3
Day 3
1. Network-based scans
It helps identify possible network security attacks. The scan helps
zero-in the vulnerable systems on wired or wireless networks.
2. Host-based scans
Host-based scans are used to locate and identify vulnerabilities in
servers, workstations or other network hosts. This type of scan
usually examines ports and services that may also be visible to
network-based scans. It also provides excellent visibility into the
configuration settings and patch history of scanned systems.
3. Wireless network scans
Wireless network infrastructure is scanned to identify
vulnerabilities. It helps in validating a company's
network.
4. Application Scans
It is used to test websites to discover all known software
vulnerabilities. It also identifies security vulnerabilities
in web applications and their source code by automated
scans on the front-end or static or dynamic source code
analysis.
5. Database Scans
Database Scans aid in identifying grey areas in a
database to prevent vicious attacks by
cybercriminals. It is identifying rogue databases
or insecure environments and classifying
sensitive data across an organization's
infrastructure.
Vulnerability Assessments Benefits
Vulnerability assessments allow security teams to
apply a consistent, comprehensive, and clear
approach to identifying and resolving security threats
and risks. This has several benefits to an organization,
such as:
○ Early and consistent identification of threats and
weaknesses in IT security.
○ Remediation actions to close any gaps and protect
sensitive systems and information.
○ Protect against data breaches and other unauthorized
access.
○ A vulnerability assessment provides an organization
with information on the security weaknesses in its
environment.
○ It provides direction on how to assess the risks
associated with those weaknesses. This process offers
the organization a better understanding of its assets,
security flaws and overall risk.
○
○ The process of locating and reporting the vulnerabilities
provides a way to detect and resolve security problems by
ranking the vulnerabilities before someone or something
can exploit them.
○ In this process, Operating systems, Application Software
and Network are scanned to identify vulnerabilities,
including inappropriate software design, insecure
authentication, etc.
INTRUSION DETECTION AND
PREVENTION SYSTEM