0% found this document useful (0 votes)
26 views

Day 3

Vulnerability assessment is a process to evaluate security risks in software systems. It aims to reduce the likelihood of unauthorized access by identifying weaknesses in a system's security procedures, design, implementation, or controls. There are several types of vulnerability assessments, including network-based scans to identify possible network attacks, host-based scans to examine vulnerabilities in devices, and wireless, application, and database scans. Regular vulnerability assessments benefit organizations by allowing them to consistently identify and resolve security threats early, protect against data breaches, and gain a better understanding of their security risks.

Uploaded by

ajaj khan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
26 views

Day 3

Vulnerability assessment is a process to evaluate security risks in software systems. It aims to reduce the likelihood of unauthorized access by identifying weaknesses in a system's security procedures, design, implementation, or controls. There are several types of vulnerability assessments, including network-based scans to identify possible network attacks, host-based scans to examine vulnerabilities in devices, and wireless, application, and database scans. Regular vulnerability assessments benefit organizations by allowing them to consistently identify and resolve security threats early, protect against data breaches, and gain a better understanding of their security risks.

Uploaded by

ajaj khan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 33

Vulnerability Assessment

Vulnerability Assessment is a process of evaluating security


risks in software systems to reduce the probability of
threats. The purpose of vulnerability testing is to reduce
intruders or hackers' possibility of getting unauthorized
access to systems.
The vulnerability is any mistake or weakness in the
system's security procedures, design, implementation, or
internal control that may violate the system's security
policy.
Types of Vulnerability Assessments

1. Network-based scans
It helps identify possible network security attacks. The scan helps
zero-in the vulnerable systems on wired or wireless networks.
2. Host-based scans
Host-based scans are used to locate and identify vulnerabilities in
servers, workstations or other network hosts. This type of scan
usually examines ports and services that may also be visible to
network-based scans. It also provides excellent visibility into the
configuration settings and patch history of scanned systems.
3. Wireless network scans
Wireless network infrastructure is scanned to identify
vulnerabilities. It helps in validating a company's
network.
4. Application Scans
It is used to test websites to discover all known software
vulnerabilities. It also identifies security vulnerabilities
in web applications and their source code by automated
scans on the front-end or static or dynamic source code
analysis.
5. Database Scans
Database Scans aid in identifying grey areas in a
database to prevent vicious attacks by
cybercriminals. It is identifying rogue databases
or insecure environments and classifying
sensitive data across an organization's
infrastructure.
Vulnerability Assessments Benefits
Vulnerability assessments allow security teams to
apply a consistent, comprehensive, and clear
approach to identifying and resolving security threats
and risks. This has several benefits to an organization,
such as:
○ Early and consistent identification of threats and
weaknesses in IT security.
○ Remediation actions to close any gaps and protect
sensitive systems and information.
○ Protect against data breaches and other unauthorized
access.
○ A vulnerability assessment provides an organization
with information on the security weaknesses in its
environment.
○ It provides direction on how to assess the risks
associated with those weaknesses. This process offers
the organization a better understanding of its assets,
security flaws and overall risk.

○ The process of locating and reporting the vulnerabilities
provides a way to detect and resolve security problems by
ranking the vulnerabilities before someone or something
can exploit them.
○ In this process, Operating systems, Application Software
and Network are scanned to identify vulnerabilities,
including inappropriate software design, insecure
authentication, etc.
INTRUSION DETECTION AND
PREVENTION SYSTEM

You might also like