Common Vulnerability Assessment Processes
In many companies, common vulnerability assessment procedures involve several different, but related, types of vulnerability assessments. Commonly, these involve scanning for’vulnerabilities ‘–those factors that can potentially allow an attacker to gain access to your company’s data or system. While vulnerabilities may arise in any part of a system, the most common vulnerability types are listed below. While vulnerabilities may occur in any part of a system, some of the most common include:
* On-site or Off-site – The most common vulnerability assessment processes include ‘off-site’ and ‘on-site’. An on-site vulnerability scanning process identifies vulnerabilities that can be physically but not logically located. For an on-site scan, an outside third party verifies whether or not your system has any vulnerabilities that need to be tended to and fixed. For an off-site scan, you typically identify the vulnerabilities that can occur from an Internet point-of-sale, for instance. Typical information security weaknesses include access control, information security, billing information security, encryption, configuration management and physical access control.
* On-network vulnerability assessment refers to any scan that identifies either a weakness that allows an attacker to gain access to your system or a weakness that allows them to bypass network connectivity. Common examples include port knocking, SQL injection and proxy servers. On-network vulnerability scans may also include protocol-based attacks, application gateway attacks, application security, buffer overflow attacks and security errors. The same goes for off-network scans: protocol-based attacks, weak proxy servers and weak application gateway addresses.
Common Vulnerability Assessment Processes Include:
* Penetration testing refers to an assessment procedure that verifies whether an attacker is able to access information stored on a specific system. Common information security testing tools include FTP and telnet. Examples of common penetration tests include Active Directory Certificateificates, Code Signing, Kerbapy, XoftSpy and WinINet. A successful penetration test usually checks whether an attacker can gain access to a network’s infrastructure.
* Identification-based vulnerability assessment includes a comparison of the attacker’s method of attack against the target’s mitigation strategy. Commonly, this type of common vulnerability assessment processes include network traffic analysis. In this process, analysts gather information about how the traffic originated and exit from the system. They also take a look at the number of vulnerable sites and the time it takes for the website to be fully patched. Common techniques used in identification-based penetration testing include Code Analytic, fuzzing and comparison to manual testing.
* Schema analysis: This is a data flow assessment technique that involves gathering information about the internal organization’s infrastructure. Typically, personnel from the IT and networking departments gather information about how web servers are installed. This includes details like how the server software matches up with the operating system and other hardware. The aim of this process is to identify any flaws in the application’s logic and how it manifests itself in execution. Common methods used in schema analysis include AVR, DCIM, DEX, Forensics, Hash Tables and JSP.