Network Scanning and Vulnerability Scanning
Network Scanning and Vulnerability Scanning
Computer Security Fundamentals
by Chuck Easttom
Chapter 11 Network Scanning and Vulnerability Scanning
*
© 2016 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning
*
Chapter 11 Objectives
Understand how to secure a system
Probe a system for vulnerabilities
Use Vulnerability vulnerability scanning tools
Evaluate potential security consultants
© 2016 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning
*
Understand and be able to conduct basic system reconnaissance.
Describe and use several port scanners.
Understand how to derive useful information about a Web site from internic or the Netcraft Web site.
Know how to locate useful information about a system or organization from Internet newsgroup postings.
Understand the use of vulnerability scanners.
Use port monitoring utilities.
© 2016 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning
*
Introduction
Secure the system.
© 2016 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning
*
The goals of the hacker and the network administrator have a great deal in common.
© 2016 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning
*
Basics of Security
Ports
Protect
Policies
Probe
Physical
© 2016 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning
*
The goals of the hacker and the network administrator have a great deal in common.
© 2016 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning
*
MBSA
Microsoft Baseline Security Analyzer
© 2016 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning
*
The goals of the hacker and the network administrator have a great deal in common.
© 2016 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning
*
Nessus
Popular Vulnerability Scanner
© 2016 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning
*
The goals of the hacker and the network administrator have a great deal in common.
© 2016 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning
*
Getting Professional Help
Certification
Education
Experience
Background Checks
© 2016 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning
*
The goals of the hacker and the network administrator have a great deal in common.
Certifications
CEH
CISSP
Security+
Vendor-specific (Microsoft, Cisco, and so on)
GAIC
© 2016 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning
*
© 2016 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning
Education
Computer Science
Engineering
Computer Information Systems
Security Degrees
© 2016 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning
*
© 2016 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning
Background and Experience
Prior Security Experience
Criminal Background Check
Credit Check
References Check
© 2016 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning
*
© 2016 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning
© 2016 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning
*
Summary
Information
The more information you have about the vulnerabilities and weaknesses of your system, the better prepared you are to defend it.
The more information the hacker has about your system’s vulnerabilities and weaknesses, the sooner it will be violated.
The tools in this chapter are for the network and security administrator and are to be used for legal, not illegal, purposes.
© 2016 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning
*
*
*
Understand and be able to conduct basic system reconnaissance.
Describe and use several port scanners.
Understand how to derive useful information about a Web site from internic or the Netcraft Web site.
Know how to locate useful information about a system or organization from Internet newsgroup postings.
Understand the use of vulnerability scanners.
Use port monitoring utilities.
*
The goals of the hacker and the network administrator have a great deal in common.
*
The goals of the hacker and the network administrator have a great deal in common.
*
The goals of the hacker and the network administrator have a great deal in common.
*
The goals of the hacker and the network administrator have a great deal in common.
*
The goals of the hacker and the network administrator have a great deal in common.
*
The post Network Scanning and Vulnerability Scanning appeared first on Lion Essays.
“Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!”
Network Scanning and Vulnerability Scanning was first posted on April 20, 2019 at 6:32 pm.
©2019 "Lion Essays". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at support@Lion Essays.com