Vulnerability Assessment Part 2

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *

Already have an account? Sign In »

35 hours 10 minutes
Video Transcription
Hello and welcome back to cyber is comped ear certified advance security practitioners Certification profession Course.
This is a continuation on margin on the two were just title vulnerably management.
These are objectives and the order which will be covered doing this particular model, which is marginal too.
Specifically, we're gonna take a look again at
a continuation off vulnerability assessment. This is section number two. Voluntary assessment. Continuation
these that objectives in order which you will be covered in the previous video. We define bone believe, Suspect. Explain why it's important
what we're gonna do now again in this particular presentation, explain the diff between vulnerably scanning and penetration testing.
So, without further ado, let's go in and clear on this particular course of action.
Now, when you think about fun with scanning versus penetration testing that has two important vulnerable assessment procedures, you have Barnum Bailey scanning and then you have penetration. Scanning the two activities are similar, but they're often confused with one another. Now, when you think about vulnerable scanning birch dispensaries and testing
barbarous scans and Barnaby assessments searched the system for known vulnerabilities.
A parent raising test on her hand attempts to actively explore weaknesses in an environment. While the vulnerability skin can be automated, a Pinterest and test requires various levels of knowledge.
And here again, if it took charge, illustrate the diff between Bombay, this scans and your Pinterest intestines. Take briefly. Take a look at this chart. Now. Force that freaks are concerned. We looking of ornaments can at least quarrel, especially after new equipment. On the other hand, we look at penetration testers once or twice a year. Force reports
the varmints can provide a comprehensive based on what bubble is this? On the other hand, you're penetration test again. Con's a concise identify. What? That it was compromised again. Obviously, we can see there are differences between a vulnerable to scan
and a penetration test.
We all can understand why individual may somehow get confused and think that they're one and the same. In fact, that's not the case
Now. Barnaby, this scan is an automated software search through your system for known security weaknesses. It creates a reporter your potential exposures. It should be compared against your baseline scans and officer. Any changes can be obviously need to be investigated
usable form from inside the security perimeters and it does not interfere with your normal network type operations.
Then there's two methods performing your bone scan. You can do intrusive bone scan. You can also do, and none intrusive. We they were in choosing attempts to actually penetrate the system to perform a simulated attack.
When you think about none intrusive, basically, it uses only available information to a proper size.
This status of your vulnerability. Other words to tryto analyze the Determine what Steve, The level of your vulnerably.
You also again improvised credentials, username and password to the scanner so it test four additional internal bottomless can be performed as well.
Here again, this particular charge in this great volume is scanning bond. The scanner is a security technique used to identify as good a witness in a computer system.
Borman scanning can be used by individual network administrators for security purpose or could be used by hackers attempted to gain unauthorized access to your computer systems. A generous scanning is a computer program designed to access your computers, your computer system, networks or application for weaknesses.
They could be run either as part of your gonna be imagined by those
tasked with protecting your system. or by black hat actress looking to gain what we call unauthorized type access.
Now we think that penetration testing is designed to explore your system weaknesses. It relies on the test of skill, obviously knowledge as well. And maybe, but another thing breezes with this particular taste. It be very cautious in regards to perform this test because it may disrupt your network operations.
The end result. Pinterest and test report. That's what you're gonna get
from again. A penetration type. Tests
there are three different techniques could be used again. One. Been a block back box, which, again the test that has no prior knowledge of your network infrastructure. It could be a white box for me to test, as in depth knowledge, your network and sisters fantastic. On one hand, it could be a great box type test.
Some limit information has been provided to the tester.
This next chart is great again the various features. It looks at viably scan as well as your countries and test. In fact, in terms of frequencies, you're bundling scam when new equipment is a stall.
Pinterest, just on hair should be performed at least once per year
now, during this particular presentation up to this point. Time to discuss Bombay assessment, explaining why it's important we discuss the deficit between a bomb, the scan and penetrates intestine in the upcoming video. We going king on our discussion by describing the security implementation implication of integration will get three parties and lastly
list some techniques for mitigating ended turing
these various attacks
so I can look forward to seeing you in the next video, which will be in fact be a continuation our vulnerability assessments.
Up Next