Professional Documents
Culture Documents
NEED
Why???
OF
INTRODUCTION
Vulnerability is susceptibility to injury or attack.
These vulnerabilities can be targeted for exploitation, which
may
result in:
Unauthorized entry into a network, can expose confidential
information, provide fuel for stolen identities, trigger theft of
business secrets, violate privacy provisions of laws and
regulations,
or paralyze business operations.
New vulnerabilities appear every day due to flaws in software,
faulty configuration of applications and IT gear, good old
human error.
19-07-2015
VM for Dummies
WHO IS AT
RISK?
19-07-2015
VM for Dummies
19-07-2015
VM for Dummies
VULNERABILITY MANAGEMENT
VM for Dummies
susceptible
to attack, run faster or improve functionality.
Use the most effective means to thwart automated
attacks (such as worms, bots, and so on).
Enable the effective improvement and management
of security risks.
Document the state of security for audit and compliance
with laws, regulations, and business policy.
19-07-2015
VM for Dummies
VM for Dummies
19-07-2015
VM for Dummies
VM for Dummies
Benefits of scanning:
What to scan?
VM for Dummies
10
Easy to understand.
Employing technologies to improve scanning:
Look for scanners that use :
A variety of active operating system (OS) discovery techniques.
Fingerprinting entails careful inspection for subtle variations in
implementation of RFC (request for comments) standards
A service discovery engine detects backdoors, Trojans, and worms by
checking TCP and UDP.
19-07-2015
VM for Dummies
11
Critical
Important
Moderate
Low
VM for Dummies
12
13
VM for Dummies
14
19-07-2015
VM for Dummies
16