Vulnerability can be defined as an issue in the software code that a hacker can exploit toharm the systems. It can be a gap in the implementation of cybersecurity proceduresoraweakness in the controls.
Examples of vulnerabilities exist in every industry. These include:
Unauthorized network access by Hackers due to a weak Firewall
➢ Cracking of Wi-Fi Passwords
➢ Exposure of sensitive data due to lack of application security
➢ Credit card data, Health Records
➢ Security misconfiguration
➢Misconfiguration of passwords
➢ Insecure cryptographic storage
Vulnerability Analysis
Vulnerability analysis is a procedure to check all the vulnerabilities in the systems, computers and other ecosystem tools. The vulnerability analysis helps in the analyzing, recognizing and ranking of the vulnerabilities as per the severity. It helps withtheidentification and assessment of threat details, enabling us to keep a resolution toprotect
them from hackers. The analysis can be done for every industry fromHealthcare toRetail
to IT
To identify vulnerabilities – Configuration, system, Design, Code, Process.
➢ Documenting the vulnerabilities.
➢ Preparation of guidance to mitigate the vulnerabilities. Importance of Vulnerability Analysis
➢ Deep dive insights of the security issues.
➢ Helps us understand the risks associated with the entire ecosystem.
➢ For security breaches
➢ Assets that are prone to cyber attacks.
Step
Assess Critical Value of each device
Step
Details of the installed systems
Vulnerability Scanning
Report Creation
Method to fix them
Network Based Scans
To identify network vulnerabilities. This scan helps to find the vulnerable systems in the wired and wireless networks.
Host Based Scans
This scan is to identify vulnerabilities in the ports, configuration, server workstations, other hosts and patch history.
Wireless Network Scans
Complete scan on wireless networks to find the vulnerabilities.
Application Scans
To test all portals and mobile applications for vulnerabilities.
Database Scans
To scan all the databases for potential vulnerabilities.
