A vulnerability assessment is a process that defines, identifies, classifies and prioritizes weaknesses in a computer system, software application or network infrastructure. The goal of the assessment is to understand potential threats and react appropriately. Vulnerability assessments typically involve the use of automated testing tools that conduct scans. Types of scans include: Network-based scans -- used to identify possible network security attack vectors. Host-based scans -- used to locate and identify vulnerabilities in servers, workstations or other network hosts. Wireless network scans -- used to identify rogue access points and spot weaknesses in configuration settings. Application scans -- used to detect known software vulnerabilities and erroneous configurations in applications that connect to the internet. Database scans -- used to identify the weak points in a database and prevent malicious attacks, such as SQL injection attacks. Vulnerability assessments vs. penetration tests A vulnerability assessment aims to uncover weaknesses in a network and recommend the appropriate mitigation or remediation to reduce or remove the risks. Although sometimes carried out in concert with vulnerability assessments, the primary aim of pen tests is to check whether a vulnerability really exists and prove that exploiting it can damage the application or network. A vulnerability assessment often includes a penetration testing component to identify vulnerabilities in an organization's personnel, procedures or processes that might not be detectable with network or system scans. The process is sometimes referred to as vulnerability assessment/penetration testing, or VAPT. While a vulnerability assessment is usually automated, penetration testing generally combines automated and manual techniques. |
No comments:
Post a Comment