官术网_书友最值得收藏!

Complexity

Today's network environments have a complex structure consisting of firewalls, DMZ, and network devices such as switches and routers. These devices consist of complex access lists and virtual network configurations, which makes it difficult to generalize any activity. A shift in any of the preceding configurations could result in a change of the architecture of the whole network.

If we are looking to perform an IP-based scan on any of the network components, we have to be sure that all the data packets generated are reaching the destination intact and are not being impacted by any of the devices or solutions in between. For example, if Alice is scanning Bob's computer over the network and both of them are separated by a firewall, where Bob's subnet is configured to be in WAN Ping Block Mode as a part of which ping packets will be identified and dropped at the firewall level, Alice's host discovery scans for Bob's computer will result in a false positive that machine is not live.

In order to perform a successful security profiling using a Network Vulnerability Scan, the following factors need to be considered:

  • Scope of the scan
  • Network architecture
  • Network access
主站蜘蛛池模板: 福贡县| 张家界市| 蒲江县| 眉山市| 寻乌县| 陵川县| 乌兰县| 固原市| 台湾省| 马尔康县| 凤冈县| 天门市| 额敏县| 龙口市| 彝良县| 永昌县| 天门市| 谢通门县| 蓬安县| 通州市| 潮安县| 定远县| 漳浦县| 乌兰察布市| 石屏县| 名山县| 青海省| 乌恰县| 五大连池市| 宕昌县| 丰原市| 德保县| 阳城县| 修武县| 辽阳县| 蓬安县| 林州市| 定日县| 盘山县| 那坡县| 岫岩|