2 cissp ® Official Study Guide Eighth Edition


Describing Vulnerabilities



Download 19,3 Mb.
Pdf ko'rish
bet625/881
Sana08.04.2023
Hajmi19,3 Mb.
#925879
1   ...   621   622   623   624   625   626   627   628   ...   881
Bog'liq
(CISSP) Mike Chapple, James Michael Stewart, Darril Gibson - CISSP Official Study Guide-Sybex (2018)

 Describing Vulnerabilities 
The security community depends upon a common set of standards to provide a common 
language for describing and evaluating vulnerabilities. NIST provides the community with 
the
Security Content Automation Protocol (SCAP)
to meet this need. SCAP provides 
this common framework for discussion and also facilitates the automation of interactions 
between different security systems. The components of SCAP include the following: 

Common Vulnerabilities and Exposures (CVE)
provides a naming system for describ-
ing security vulnerabilities. 

Common Vulnerability Scoring System (CVSS)
provides a standardized scoring system 
for describing the severity of security vulnerabilities. 

Common Configuration Enumeration (CCE)
provides a naming system for system 
configuration issues. 

Common Platform Enumeration (CPE)
provides a naming system for operating sys-
tems, applications, and devices. 

Extensible Configuration Checklist Description Format (XCCDF)
provides a language 
for specifying security checklists. 

Open Vulnerability and Assessment Language (OVAL)
provides a language for 
describing security testing procedures.
 Vulnerability Scans 
Vulnerability scans
automatically probe systems, applications, and networks, looking for 
weaknesses that may be exploited by an attacker. The scanning tools used in these tests 
provide quick, point-and-click tests that perform otherwise tedious tasks without requiring 
manual intervention. Most tools allow scheduled scanning on a recurring basis and provide 
reports that show differences between scans performed on different days, offering adminis-
trators a view into changes in their security risk environment. 


Performing Vulnerability Assessments 
669
There are four main categories of vulnerability scans: network discovery scans, network 
vulnerability scans, web application vulnerability scans, and database vulnerability scans. 
A wide variety of tools perform each of these types of scans. 
Remember that information security professionals aren’t the only ones 
with access to vulnerability testing tools. Attackers have access to the 
same tools used by the “good guys” and often run vulnerability tests 
against systems, applications, and networks prior to an intrusion attempt. 
These scans help attackers zero in on vulnerable systems and focus 
their attacks on systems where they will have the greatest likelihood of 
success.

Download 19,3 Mb.

Do'stlaringiz bilan baham:
1   ...   621   622   623   624   625   626   627   628   ...   881




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish