Time
33 hours 23 minutes
Difficulty
Beginner
CEU/CPE
33

Video Transcription

00:00
Hello and welcome back to Cyber is 2019 comp tier security plus certification purpose. Of course,
00:09
we're going continue our discussion on margin one. The top of discussion domain one. Threats, attacks and vulnerabilities.
00:17
Surprising enough, we have a brand new objective which encompasses this particular main. Its title. 1.5. Explain bone abilities. Scanning concepts before we begin the price. Actually explaining boneless skinning concept. Let's first or engage in a short pre assessment quist,
00:33
and the question is as follows as security program alerts you of a failed logging attempt to a secure system
00:41
on investigation. You learn the system normal user accidentally had the cat blocks turned on. What kind of alert was it is a
00:50
a true positive.
00:51
Be a true negative. See ah, false positive or D off false negative
00:58
if you selected answer being see you're absolutely correct because it was a false positive since you were alerted of the potential incident. But there was no real threat.
01:10
Continue on what type of disgust again, this brain new objectives, his title explained,
01:15
vomited scanty concept here again of the topics which encompasses this particular objective,
01:21
ranging from passively tests your security controls
01:23
identify vulnerabilities, identify lack of security controls,
01:29
identify common miss configurations
01:33
and take a look at intrusive versus none intrusive
01:37
credential versus non credential
01:40
and last. But I certainly said which false positive.
01:45
Now the first thing we will take a look. It's passively test your security controls. An important point of by Bone scan is that it does not attempt to export any vulnerabilities instead of honorably. Skin is a passive attempt to identify weaknesses within your particular systems.
02:04
Then we have. We want to also go about the price. Identifying the various vulnerable is when you think about a vulnerability. It's a weak spot or weakness in your network that might be explored by a security threat.
02:16
We also want identify the lack of security controls.
02:21
Vulnerable is scanning can also identify Mrs security controls, such as a lack of update patches or a lack of an A virus type software.
02:30
Then we also go to the price identify common mis configuration,
02:35
as you're well aware of the one of the biggest issue have nowadays is miss configuration. Other words, someone, assuming that perhaps they got happy second figure properly, and then they finally the role that the information that was going over the network was actually going over in clear text.
02:52
Now, with a vitamin scanning looks at the architecture design of the floor data, it is flowing in
02:57
and also addresses certain issues such a security controls.
03:01
Other words. You able to conduct what we call court review a bone scan. It can pass any test it the source code of programs and application to find vulnerabilities before the application are actually put into production.
03:15
Then we have intrusive versus none intrusive. Obviously, there are some differences. When you look again first of art, intrusive what it does. It tries to exercise of vulnerability, which can crash or alter your remote target.
03:30
Then we have none intrusive tests. They try not to cause any harm or damage.
03:37
Then we have credential versus non credential
03:39
on credentials. Scans are less accurate due to the high number of false positives. Vigna credential scans are more accurate due to obviously, in this case than nature. Of the scans,
03:53
we look a term called a false positive Ah, false positives, a false alarm. However, a false mega doesn't take anything while you have been attacked.
04:02
A false positive is where the scam believe that there is a vulnerably, but when you visited, check it.
04:09
It's not there
04:12
at this one time. We have our post assessment quiz,
04:15
and the question is as follows A vomiting scan can be in choosing unknown in choosing it is true or false.
04:25
If you say that a your absolute crypt because intrusive skin on less invasive than penetration tests but still can raise alarms or even cause system errors
04:36
at its four time, we have some key takeaways and the rest follows Were under the vulnerably assessment is the price of identifying, quantifying and privatizing or ranking
04:46
the vulnerabilities of a system
04:48
We learned the truth. The test. Try to exercise of honorably, which which can obviously can crash. Alter your remote target
04:58
A. None of choose a test tries not to home
05:00
or other words cause any harm to the target.
05:03
A non credential scan will monitor the network to see any vulnerable. Is that attack at what is defined? We should fix the volume we found with a non quit interest game first, as this is what the hackers see when they enter your network.
05:18
Evidential scan is much more faster. Version of a vulnerable scan. It provides more detailed information than a non credential types can.
05:27
A false posits were the scam Believe that there's a vulnerability, but when you physically check it, it's not there.
05:35
In our upcoming presentational upcoming topics, we continue our discussion domain one, which is titled Threats, Attacks and More Ability. In fact, we have a brand new learn objective, which is tired of 1.6.
05:46
Explain the impact associate with the types of vulnerabilities
05:51
I look forward to soon the very next video.

Up Next

CompTIA Security+

Interested in the cybersecurity industry? The CompTIA Security+ is the gold standard for those looking to enter the cybersecurity industry. Join thousands of professionals who have gained this certification through this course and launched their careers in information security.

Instructed By

Instructor Profile Image
Jim Hollis
Independent Contractor
Instructor