Security Fridays #1 - Vulnerability Scanning (aka Oh My God! Everything looks insecure!)


Userlevel 7
Badge +7
  • Veeam Legend
  • 717 comments

In this series of posts, I'll discuss cybersecurity and tools that can improve your cybersecurity posture. Usual caveats apply and at your own risk.

 

This week, I wanted to start off by discussing Vulnerability Scanning. It is one of the best starting points when trying to determine the security status of the current environment. Vulnerability scanning is a critical tool for identifying potential security weaknesses in computer systems and networks. By scanning for vulnerabilities, potential areas of weakness can be identified and steps can be taken to prevent them from being exploited by hackers and other malicious actors. Another main advantage is that it can help stay ahead of the constantly evolving threat landscape and assist in remediation priorities.

 

What is Vulnerability Scanning?

In short, it is the process of using automated software tools to scan computers and networks for potential vulnerabilities. This is done by scanning for and detecting known vulnerabilities in software, operating systems, and network configurations, and reporting them for remediation.

Scanning involves three stages:

- Scanning: A series of tests will be carried out to identify vulnerabilities.
- Analysis: Identify weaknesses and determine the severity. Usually, for a given vulnerability, there will be a CVE identifier which helps determine the severity of the vulnerability. This, in turn, helps prioritise remediation. For example, a score of 10 is the highest, so patch NOW!
- Remediation: At this stage, action is taken to address the identified vulnerabilities. This usually involves applying software patches, reconfiguring settings, or applying configuration settings to 'harden' an environment.

 

Why is Vulnerability Scanning Important?

The threat landscape is constantly evolving due to the varied nature of tooling that a malicious actor can leverage against an organisation. New techniques and tools are constantly being developed. There is a saying that is quite apt, "The bad guys only have to be successful once, while the defenders have to be successful all the time."

There are different types of Vulnerability Scanning such as:

- Network Scanning
- Application Scanning
- Web Scanning
- Wireless Scanning
- Database Scanning

Vulnerability scanning is one tool in the cybersecurity toolkit to help defend against malware and malicious actors. It allows organisations to proactively identify potential security weaknesses and take steps to address them before they can be exploited. By regularly scanning systems and networks for vulnerabilities, organisations can stay ahead of the curve and minimise the risk of a successful cyber attack.


5 comments

Userlevel 7
Badge +20

Really great idea @dips and looking forward to reading this series.

Userlevel 7
Badge +7

Really great idea @dips and looking forward to reading this series.

Thank you!

Userlevel 7
Badge +17

Thanks for sharing @dips ...looking forward to the next post in the series.

Userlevel 7
Badge +9

Great piece @dips! Cheers

Userlevel 7
Badge +7

Thanks @coolsport00 @Iams3le 

Comment