Vulnerability Scanning

1282 Words3 Pages

This paper is being furnished to provide the CIO with a technology evaluation of vulnerability scanning. The information provided will ensure that the CIO has the required information to make the best decision in regards to this technology. This paper provides a brief understanding of vulnerability scanning, its many forms, the types of scanners available, the advantages and disadvantages, and the costs involved.

Introduction

Vulnerability scanning is an automated process that is conducted by an organization’s IT staff to identify any vulnerability that their information systems might possess and used to help “secure your own network” (Bradley). It is also used by hackers that are conducting reconnaissance on an organizations network to find any vulnerability that they might exploit. These next few pages will provide information on vulnerabilities, the many different forms of vulnerability scanning, the different types, pro’s and con’s, and costs.

Vulnerabilities

Vulnerabilities occur when corrupted code or misconfigured hardware are on a network. This is why it is important for an organization to have an effective vulnerability assessment plan that includes regular scans of the network and annual penetration tests. These scans are very important to prevent hackers from “utilizing these flaws to gain access to your machines” (Houghton, 2003). An excellent source of information to get “summaries, technical details, remediation information, and lists of affected vendors” (US-CERT) is the Vulnerability Notes Database. Please view Appendix B for current threats.

What Are The Forms of Vulnerability Scanning?

Just like any other security tool or software available, there are many different forms of vulnerability s...

... middle of paper ...

....infosec.gov.hk/english/technical/files/vulnerability.pdf

Houghton, K. (2003). Vulnerabilities & Vulnerability Scanning. Retrieved from https://www.sans.org/reading-room/whitepapers/threats/vulnerabilities-vulnerability-scanning-1195

NWN Corporation (n.d.). Vulnerability Scanning. Retrieved November 12, 2013, from http://www.nwnstar.com/NWN_STAR/Vulnerability_Scanning.html

Orrill, J. (n.d.). What Is the Difference Between Active & Passive Vulnerability Scanners? | Chron.com. Retrieved from http://smallbusiness.chron.com/difference-between-active-passive-vulnerability-scanners-34805.html

Secure State (n.d.). External Vulnerability Scans. Retrieved November 12, 2013, from http://www.securestate.com/Services/Risk%20Management/Pages/External-Vulnerablity-Scans.aspx

US-CERT (n.d.). Vulnerability Notes. Retrieved November 12, 2013, from http://www.kb.cert.org/vuls/

Open Document