官术网_书友最值得收藏!

Vulnerability analysis

Threats are a serious problem for people and organizations. A clear understanding of vulnerability analysis is important to ensure that wise managerial decisions are taken and that a secure environment is built as a result of correctly identifying and mitigating such potential threats. Unfortunately, this is still a challenging area for information professionals because threats are becoming more sophisticated and hard to detect every day. Vulnerability assessment is the process of identifying, measuring, and classifying vulnerabilities in an information system. Vulnerability analysis is a critical skill for every pentester.

There is a big misunderstanding when it comes to vulnerability assessment. Many penetration testers confuse vulnerability analysis with penetration testing. In fact, penetration testing is simulating an attack, whereas vulnerability assessment is intended to identify vulnerabilities in a specific area. You can view it as a scanning operation.

A vulnerability management life cycle goes through the following six main phases:

  • Identification and discovery: During this phase, the pentester tries to identify all the assets within the discussed scope, including open services and operating systems and tries to detect common potential vulnerabilities in an information system, usually using automation tools and vulnerability scanners.
  • Prioritizing and classification: The penetration tester prioritizes the assets based on sensitivity criteria or based on categories. You can also prioritize vulnerabilities using a ranking system, for example, using the Common Vulnerability Scoring System (CVSS) for the Common Vulnerabilities and Exposures (CVE) vulnerabilities.
  • Assessment: This involves documenting analyzed risks. The pentester must make a decision about the risk acceptance after an evaluation process. When conducting a vulnerability assessment, you need to validate every found vulnerability. Using vulnerability scanners is important to detect potential vulnerabilities, but penetration testers need to verify every one of them to avoid false positive and incorrect flags.
  • Report: During this phase, the pentester shows the results of the conducted vulnerability assessment including the number of issues and trends, accompanied by graphical representations of the obtained artifacts.
  • Remediate: This is a detailed roadmap that includes recommendations and the  steps required to remediate and fix vulnerabilities, not only technically, but it could include budgets, time slots, raking, and so on.
  • Verification: The final step involves verifying the fixed vulnerabilities after a follow-up check:
主站蜘蛛池模板: 旅游| 晋中市| 繁峙县| 洛扎县| 乐至县| 漳平市| 新昌县| 金华市| 山东省| 滨州市| 台安县| 普安县| 利津县| 长阳| 洪洞县| 通城县| 青州市| 西畴县| 莆田市| 陇西县| 荣成市| 桂东县| 洪泽县| 开阳县| 边坝县| 故城县| 蒙阴县| 盱眙县| 无棣县| 华坪县| 综艺| 安康市| 双牌县| 土默特右旗| 汕头市| 股票| 油尖旺区| 昂仁县| 武义县| 连州市| 麦盖提县|