官术网_书友最值得收藏!

Vulnerability analysis

Threats are a serious problem for people and organizations. A clear understanding of vulnerability analysis is important to ensure that wise managerial decisions are taken and that a secure environment is built as a result of correctly identifying and mitigating such potential threats. Unfortunately, this is still a challenging area for information professionals because threats are becoming more sophisticated and hard to detect every day. Vulnerability assessment is the process of identifying, measuring, and classifying vulnerabilities in an information system. Vulnerability analysis is a critical skill for every pentester.

There is a big misunderstanding when it comes to vulnerability assessment. Many penetration testers confuse vulnerability analysis with penetration testing. In fact, penetration testing is simulating an attack, whereas vulnerability assessment is intended to identify vulnerabilities in a specific area. You can view it as a scanning operation.

A vulnerability management life cycle goes through the following six main phases:

  • Identification and discovery: During this phase, the pentester tries to identify all the assets within the discussed scope, including open services and operating systems and tries to detect common potential vulnerabilities in an information system, usually using automation tools and vulnerability scanners.
  • Prioritizing and classification: The penetration tester prioritizes the assets based on sensitivity criteria or based on categories. You can also prioritize vulnerabilities using a ranking system, for example, using the Common Vulnerability Scoring System (CVSS) for the Common Vulnerabilities and Exposures (CVE) vulnerabilities.
  • Assessment: This involves documenting analyzed risks. The pentester must make a decision about the risk acceptance after an evaluation process. When conducting a vulnerability assessment, you need to validate every found vulnerability. Using vulnerability scanners is important to detect potential vulnerabilities, but penetration testers need to verify every one of them to avoid false positive and incorrect flags.
  • Report: During this phase, the pentester shows the results of the conducted vulnerability assessment including the number of issues and trends, accompanied by graphical representations of the obtained artifacts.
  • Remediate: This is a detailed roadmap that includes recommendations and the  steps required to remediate and fix vulnerabilities, not only technically, but it could include budgets, time slots, raking, and so on.
  • Verification: The final step involves verifying the fixed vulnerabilities after a follow-up check:
主站蜘蛛池模板: 清苑县| 漳平市| 蒲城县| 宜州市| 安义县| 青田县| 夏河县| 苍山县| 晋中市| 全南县| 玛纳斯县| 建德市| 苏州市| 曲阳县| 弥渡县| 海南省| 社旗县| 霍州市| 龙里县| 信阳市| 福海县| 长泰县| 松原市| 东城区| 文昌市| 景谷| 泗水县| 盐池县| 通化县| 南溪县| 长白| 双牌县| 芷江| 开江县| 柳林县| 天全县| 石渠县| 德江县| 昌都县| 新丰县| 桂东县|