Selecting and Implemeting Vulnerability Scannner for Fun and ...
SELECTING AND IMPLEMENTING VULNERABILITY SCANNER FOR FUN AND PROFIT by Tim Jett and Mike Townes Conducting Vulnerability Assessments Without Disrupting Your Network Notice: The views and opinions expressed in this presentation are those of the presenters and do not necessarily represent any organization or company they will be associated with in the future.
May the force be with you! WHY VULNERABILITY MANAGEMENT? Ensure protection of critical data Meet compliance regulations Reduce risk or minimize impact by addressing vulnerabilities in a timely
manner Prepare to meet future security What is a Vulnerability Scanner A vulnerability scanner is a computer program designed to assess computers, computer systems, networks or applications for weaknesses. They can be run either as part of vulnerability management by those tasked with protecting systems - or by
black hat attackers looking to gain unauthorized access. Types of Vulnerability Scanners Agent verses Agentless Active verses Passive Vulnerability Scanners - Benefits
Very good at checking for hundreds (or thousands) of potential problems quickly Automated Regularly Can help identify rogue machines Helpful in inventory devices on the network What Vulnerability Scanner Do Well
Provide a generic risk level Explain why the item is a risk Provide detailed information on how to remediate The differences of how your scanner does the above items are some of the key differences between the scanners. How Vulnerability Scanners Work
Similar to virus scanning software: Contain a database of vulnerability signatures that the tool searches for on a target system Cannot find vulnerabilities not in the database New vulnerabilities are discovered often Vulnerability database must be updated
regularly Challenges Security resources are often decentralized The security organization often doesnt own the network or system Always playing catch-up to changing threats
Determining if the fix was actually made Ignoring it accepting it Decisions for your First Scan Full Scan Verses Known Segment
Time and bandwidth verses Unknown devices Is Your Network Ready for This? Poor Network Configuration can lead to Security getting blamed for bandwidth issues (what to look for how to resolve) Dream Vs. Reality
Dream of vulnerability scanner Plug in Get data Network/Endpoint Teams Act on Information Network Secured You Emerge as Security Hero!
Dream Vs. Reality Proper planning : Policies and Procedures for the Scanning Process Track Inventory and Categorize Assets Identify and Understand your business
processes To the network team it looks like an attack So You Scanned Now What Cant expect folks to act on 1,000 page
reports. Need to provide some prioritization What are the biggest risks in your environment What is the level of risk that is acceptable in your environment What is the threat level that exists in your industry. What Vulnerability Scanners Cant Do
Scan items not connect to the network Tell you how bad a vulnerability is in your environment. (ratings are universal) Tell you exactly where a device is Major Players Tenable (Nessus) Rapid 7 Qualys
Basically anything external EXCEPT people. Man vs. Environment Examples People struggling with a flood A tornado hits your house Stranded in the wilderness After Reading Ch 3 and 4 What is meant by in the passage, "he was gone, gone...
Suffixes Suffixes are endings that are added to root words. They can change adjectives into nouns They can change verbs into nouns Root word and add -ness Fair fairness Kind kindness Fit fitness Wicked wickedness Willing willingness Childish childishness Foolish...
Electron Configuration Chemistry Mrs. Coyle Electron Configuration The way electrons are arranged around the nucleus. Three rules are used to build the electron configuration: Aufbau principle Pauli Exclusion Principle Hund's Rule Aufbau Principle Electrons occupy orbitals of lower energy first.
Your travel agent told you that someone from your Chinese family, whom you have seen before, will come to the airport to pick you up. When you arrive at the China airport, you see a young lady who looks like...
Concepts apply the steps and the. traditions to our service work. ... democracy . is the best method . for serving OA. Delegates. From. Intergroups, service boards worldwide. region chairpersons ... Concept Five. Consideration.
تتنفس الأسماك عادة بالخياشـيم أما ما يسمى بالمثانة الهـوائية air-bladder أو المثانة الغـازية gas-bladder أو كيس العوم swim-bladder والتي غالباً ما توجـد في الأسماك العظمية فـإنها لا تؤدي وظيفة تنفسـية إلا ...