Download presentation
Presentation is loading. Please wait.
Published byMervin Hamilton Modified over 9 years ago
1
SELECTING AND IMPLEMENTING VULNERABILITY SCANNER FOR FUN AND PROFIT by Tim Jett and Mike Townes
2
Conducting Vulnerability Assessments Without Disrupting Your Network Notice: The views and opinions expressed in this presentation are those of the presenters and do not necessarily represent any organization or company they will be associated with in the future. May the force be with you!
3
WHY VULNERABILITY MANAGEMENT? Ensure protection of critical data Meet compliance regulations Reduce risk or minimize impact by addressing vulnerabilities in a timely manner Prepare to meet future security
4
What is a Vulnerability Scanner A vulnerability scanner is a computer program designed to assess computers, computer systems, networks or applications for weaknesses. They can be run either as part of vulnerability management by those tasked with protecting systems - or by black hat attackers looking to gain unauthorized access.
5
Types of Vulnerability Scanners Agent verses Agentless Active verses Passive
6
Vulnerability Scanners - Benefits Very good at checking for hundreds (or thousands) of potential problems quickly – Automated – Regularly Can help identify rogue machines Helpful in inventory devices on the network
7
What Vulnerability Scanner Do Well Provide a generic risk level Explain why the item is a risk Provide detailed information on how to remediate The differences of how your scanner does the above items are some of the key differences between the scanners.
8
How Vulnerability Scanners Work Similar to virus scanning software: – Contain a database of vulnerability signatures that the tool searches for on a target system – Cannot find vulnerabilities not in the database New vulnerabilities are discovered often Vulnerability database must be updated regularly
9
Challenges Security resources are often decentralized The security organization often doesn’t own the network or system Always playing catch-up to changing threats Determining if the fix was actually made Ignoring it – accepting it
10
Decisions for your First Scan Full Scan Verses Known Segment Time and bandwidth verses Unknown devices Is Your Network Ready for This? Poor Network Configuration can lead to Security getting blamed for bandwidth issues (what to look for – how to resolve)
11
Dream Vs. Reality Dream of vulnerability scanner Plug in Get data Network/Endpoint Teams Act on Information Network Secured You Emerge as Security Hero!
12
Dream Vs. Reality Proper planning : Policies and Procedures for the Scanning Process Track Inventory and Categorize Assets Identify and Understand your business processes To the network team it looks like an attack
13
So You Scanned – Now What Can’t expect folks to act on 1,000 page reports. Need to provide some prioritization What are the biggest risks in your environment What is the level of risk that is acceptable in your environment What is the threat level that exists in your industry.
14
What Vulnerability Scanners Can’t Do Scan items not connect to the network Tell you how bad a vulnerability is in your environment. (ratings are universal) Tell you exactly where a device is
15
Major Players Tenable (Nessus) Rapid 7 Qualys Tripwire (nCircle) OPenVAS
16
Questions? Game Over
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.