9781111640125_IM_ch04

Security+ Guide to Network Security Fundamentals

Info iconThis preview shows pages 1–4. Sign up to view the full content.

View Full Document Right Arrow Icon
Security+ Guide to Network Security Fundamentals, Fourth Edition 4-1 Chapter 4 Vulnerability Assessment and Mitigating Attacks At a Glance Instructor’s Manual Table of Contents Overview Objectives Teaching Tips Quick Quizzes Class Discussion Topics Additional Projects Additional Resources Key Terms
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Security+ Guide to Network Security Fundamentals, Fourth Edition 4-2 Lecture Notes Overview For computer networks, a vulnerability assessment is like a comprehensive inspection that you have done on your vehicle before a long trip. The purpose of a vulnerability assessment is to uncover both your known and unknown application weaknesses. Vulnerability assessments are also useful for testing your incident response procedures. This chapter covers the basics of discovering vulnerabilities and the steps you can take to mitigate (protect) those vulnerabilities. Chapter Objectives Define vulnerability assessment and explain why it is important List vulnerability assessment techniques and tools Explain the differences between vulnerability scanning and penetration testing List techniques for mitigating and deterring attacks Teaching Tips Vulnerability Assessment 1. Emphasize that one of the most important assets any organization possesses is its data. 2. Explain that many organizations do not seriously examine the vulnerabilities associated with data and thus are unprepared to adequately protect it. What Is Vulnerability Assessment? 1. Explain that vulnerability assessment is a systematic and methodical evaluation of the exposure of assets to attackers, forces of nature, or any other entity that is potentially harmful. 2. Discuss the steps in a vulnerability assessment, which attempts to identify: a. What needs to be protected (asset identification) b. What the pressures are against it (threat evaluation) c. How susceptible the current protection is (vulnerability appraisal) d. What damages could result from the threats (risk assessment) e. What to do about it (risk mitigation). Assessment Techniques 1. Explain that several different techniques can be used in a vulnerability assessment.
Background image of page 2
Security+ Guide to Network Security Fundamentals, Fourth Edition 4-3 2. Define a baseline, which is an imaginary line by which an element is measured or compared. It can be seen as the standard. 3. Mention that baseline reporting is a comparison of the present state of a system compared to its baseline. 4. Explain that because flaws in software—operating systems, application programs, and utility programs—can all be points at which an attacker can try to penetrate and launch a successful attack, it is important that software vulnerabilities be minimized while the software is being developed (instead of being “patched” later).
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 4
This is the end of the preview. Sign up to access the rest of the document.

This document was uploaded on 03/01/2012.

Page1 / 8

9781111640125_IM_ch04 - Security+ Guide to Network Security...

This preview shows document pages 1 - 4. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online