1.1 Understanding the Need for Vulnerability Management -VM

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
or

Already have an account? Sign In »

Time
1 hour 23 minutes
Difficulty
Beginner
CEU/CPE
2
Video Transcription
00:01
in the last video, we talked about my background
00:04
and, of course, objectives.
00:06
In his video, we're gonna talk about risk posed by cyber criminals
00:10
and sort of software vulnerabilities.
00:15
Let's take a look at the lesson objectives
00:17
we have risk
00:19
understanding risk posed by cyber criminals.
00:22
We have sources
00:24
reviewed all sources of on abilities.
00:26
We have friends
00:28
survey international trends and vulnerabilities, and lastly, we have defining vulnerability management.
00:35
If I had one ability management as a way to remove risk,
00:42
so get the pre assessment.
00:44
What is a vulnerability?
00:46
Is it a shrink in a system?
00:49
Be
00:50
weakness in the system
00:51
or see weakness in a human
00:58
dancer. Here is be
01:00
It is a weakness in a system
01:03
cause we're talking about
01:03
I t. Security here. We're not talking about physical security.
01:11
Let's take a look at understanding the risk pools by side of criminals.
01:15
So when exposed vulnerabilities can lead to
01:19
data lows,
01:21
I think any Delph
01:23
I'm not. The rise network access
01:26
and intellectual property does
01:29
to a cybercriminal vulnerabilities on it that were going hitting high value assets but exposed. These vulnerabilities can
01:37
be targeted for exploitation
01:40
which may result in unauthorized entry into it network.
01:42
It can't expose confidence information, provide fuel for stolen identities
01:48
triggered deaf of business secrets, violate privacy provisions of laws and regulations or paralyzed business operations.
02:00
Now let's look at the five trends of Attackers.
02:04
You have commercialization of attacks.
02:07
We have threats, tear by region.
02:12
We have multi stage attacks.
02:15
We have trusted entity exploitation.
02:19
And lastly, we have attacks.
02:22
Well attack method conversions.
02:27
So
02:29
endless public disclosures in the news of data breaches reveal done. Authorize exposure of millions of confidential consumer records worldwide.
02:38
This is adequate proof why organizations must do more to protect networks from attacks as we see here listed on shrink.
02:47
But a dramatic change in the security threat landscape is raising the bar for organizations large and small
02:54
that want to actively minimize successful attacks on airborne abilities.
03:02
So let's look at the sources of our abilities. Here
03:07
we have a poorly written code.
03:09
We have miss configuration,
03:13
and we have, as Dr Evil will say,
03:16
human Era
03:21
says, Look at poorly written cool,
03:24
so it is not checking
03:27
data buffers in code.
03:29
So basically this happens when
03:31
a application owner of basically application team
03:36
writes code
03:37
and they're not secured it. So basically they're leaving out commas
03:42
or they're leaving our statements that actually closes and secure
03:46
dad code
03:47
in which a Buffalo overflow can happen.
03:52
So a buffalo flu is
03:53
attack is an attack where
03:57
an attacker or a hacker in this case
04:00
sends multiple requests to a computer,
04:02
to the point where
04:04
the income and server
04:08
cannot handle it, in which it's overflowed with data
04:13
in which exposes a computer to that vulnerability,
04:16
causing it to shut down,
04:18
enhance a buffer. Overflow happens.
04:23
So think of it as it river that's flowing a river of data that's flowing into the server
04:29
and pretty much breaching serve,
04:30
allowing it attacker get it
04:35
sounds like that miss configuration.
04:38
So that's miss configuring security devices.
04:41
So that'll be far walls
04:44
that could be proxies.
04:45
And also that could be itself,
04:46
which is also known as a security event. Manage.
04:49
So if your security event manager is not the figure correctly meaning that alerts on a
04:55
security event manager is not detecting
04:58
any sort of anomalies or any sort of threats in an environment
05:03
fro whoa is not gonna be
05:05
ping or basically communicated to from the Cell
05:10
and also the proxy is not gonna be communicated from Simmons Well, too,
05:14
in which the far wall detects any eyepiece that does not
05:17
belong within a enterprise,
05:20
and a proxy detects
05:23
any unauthorized websites
05:26
that employees are not allowed to go.
05:31
So it's like that other threats here
05:33
toe with Mel wear,
05:35
which covers the viruses, worms and more.
05:40
We're new vulnerabilities,
05:43
and also we have users that visiting Latin
05:46
well, Mel where? Latin Website. So basically
05:49
it's for is like power to type of websites. Partying, videos, partying,
05:56
music.
05:57
So there are new vulnerabilities every day that are caused by software code issues, configuration issues
06:03
and also human error.
06:08
So a solution.
06:11
The man in question is.
06:13
Is there a solution?
06:15
Yes.
06:16
First up, the immunize your network against vulnerabilities.
06:23
Next, you have to identify and remove
06:26
Born Abilities Deli
06:30
and third. And most important,
06:32
we must manage our own abilities,
06:36
so it's based on priority. If you have a critical vulnerability, it comes that
06:40
compared to a little vulnerability,
06:43
you must
06:45
take care of the critical vulnerability. First,
06:47
the owner vulnerability that takes presidents to a critical vulnerability
06:51
in which stays on the same line is a zero day
06:56
meaning that
06:57
you have no time
07:00
to find a fix Water, basically of no timeto wait to fix it. You have to fix it immediately.
07:08
Now let's look at the post assessment.
07:11
What are known Forms off suffer of on abilities?
07:15
Is it eight humans?
07:16
Is it B viruses or it? Or is it C o T serve?
07:24
The answer here is be
07:26
viruses.
07:30
Now let's take a look at our summer here.
07:32
So in his video,
07:33
we talked about sources of vulnerabilities in defiant vulnerability management.
07:39
In the next video,
07:41
we're going to wrap up on our discussion on why we need
07:45
vulnerability management by talking about identifying and fixing boats.
Up Next
Fundamentals of Vulnerability Management

Most of the successful attacks through a business network could be prevented with vulnerability management. This course focuses on what you can do to automatically manage vulnerabilities and keep your network safe from attack.

Instructed By