Assessing Vulnerabilities
Tools & Methods for Assessing Vulnerabilities
Port Scanner & Registry Checker
- A port scanner scans a computer for any open ports that may be able to be exploited by hackers.
- Works by sending a request to each port noting any that respond.
- A registry checker performs backups of the registry.
- Also checks for registry entry errors & restores the backups.
Vulnerability Scanners
- Website Vulnerability Scanners search for vulnerabilities on websites.
- Performs a wide variety of tests on the website to identify issues.
- Vulnerability Detection and Management Software are alike to the website vulnerability scanners but for other IT systems.
- Will first analyse the system and then runs relevant tests for possible vulnerabilities.
Assessing User Vulnerabilities
- Involves identifying any vulnerabilities that might be caused by the users of the system.
- Auditing access requirements needs, cybersecurity training of staff & password complexity used could all be involved.
- Can also perform mock attacks, such as a fake phishing email.
Third Party Reviews of Systems & Network Designs
Third Party Reviews of Systems & Network Designs
- Before implementing a system we design it and this design should fully consider vulnerabilities & threats.
- Independent third-parties can offer specialist cybersecurity knowledge to your design to ensure all issues are considered.
- Failing to do so can lead to suffering attacks & expensive changes to the network.
Penetration Testing
- This is where a cyberattack is simulated against a computer system to identify vulnerabilities.
- A “white hat” hacker is a term used for someone who specialises in this.
- The penetration test will cover all areas where vulnerabilities can arise, such as software, hardware, network, processes and user behaviour.
OWASP Top 10
- Updated every few years with the most common vulnerabilities to web applications, so a good starting point for penetration testing.
- Broken access control
- Cryptographic failures
- Injection
- Insecure design
- Security misconfiguration
- Vulnerable or outdated components
- Broken authentication
- Software & data integrity failures
- Insufficient logging & monitoring
- Server-Side Request Forgery (SSRF)