Introducing 

Prezi AI.

Your new presentation assistant.

Refine, enhance, and tailor your content, source relevant images, and edit visuals quicker than ever before.

Loading…
Transcript

Assessing Vulnerabilities

Tools & Methods for Assessing Vulnerabilities

Port Scanner & Registry Checker

  • A port scanner scans a computer for any open ports that may be able to be exploited by hackers.
  • Works by sending a request to each port noting any that respond.

  • A registry checker performs backups of the registry.
  • Also checks for registry entry errors & restores the backups.

Vulnerability Scanners

  • Website Vulnerability Scanners search for vulnerabilities on websites.
  • Performs a wide variety of tests on the website to identify issues.

  • Vulnerability Detection and Management Software are alike to the website vulnerability scanners but for other IT systems.
  • Will first analyse the system and then runs relevant tests for possible vulnerabilities.

Assessing User Vulnerabilities

  • Involves identifying any vulnerabilities that might be caused by the users of the system.

  • Auditing access requirements needs, cybersecurity training of staff & password complexity used could all be involved.

  • Can also perform mock attacks, such as a fake phishing email.

Third Party Reviews of Systems & Network Designs

Third Party Reviews of Systems & Network Designs

  • Before implementing a system we design it and this design should fully consider vulnerabilities & threats.

  • Independent third-parties can offer specialist cybersecurity knowledge to your design to ensure all issues are considered.

  • Failing to do so can lead to suffering attacks & expensive changes to the network.

Penetration Testing

Penetration Testing

  • This is where a cyberattack is simulated against a computer system to identify vulnerabilities.

  • A “white hat” hacker is a term used for someone who specialises in this.

  • The penetration test will cover all areas where vulnerabilities can arise, such as software, hardware, network, processes and user behaviour.

OWASP Top 10

  • Updated every few years with the most common vulnerabilities to web applications, so a good starting point for penetration testing.

  • Most recent top 10 are:
  • Broken access control
  • Cryptographic failures
  • Injection
  • Insecure design
  • Security misconfiguration
  • Vulnerable or outdated components
  • Broken authentication
  • Software & data integrity failures
  • Insufficient logging & monitoring
  • Server-Side Request Forgery (SSRF)
Learn more about creating dynamic, engaging presentations with Prezi