computer security fundamentals by chuck easttom chapter 11 network scanning and vulnerability...

11
Computer Security Fundamentals by Chuck Easttom Chapter 11 Network Scanning and Vulnerability Scanning

Upload: julius-price

Post on 19-Jan-2016

215 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Computer Security Fundamentals by Chuck Easttom Chapter 11 Network Scanning and Vulnerability Scanning

Computer Security Fundamentals

by Chuck Easttom

Chapter 11 Network Scanning and Vulnerability Scanning

Page 2: Computer Security Fundamentals by Chuck Easttom Chapter 11 Network Scanning and Vulnerability Scanning

© 2012 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning 2

Chapter 11 Objectives

Understand how to secure a system Probe a system for vulnerabilities Use Vulnerability vulnerability scanning tools Evaluate potential security consultants

Understand how to secure a systemProbe a system for vulnerabilitiesUse Vulnerability vulnerability scanning toolsEvaluate potential security consultants

Page 3: Computer Security Fundamentals by Chuck Easttom Chapter 11 Network Scanning and Vulnerability Scanning

© 2012 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning 3

Introduction

Secure the system.

Page 4: Computer Security Fundamentals by Chuck Easttom Chapter 11 Network Scanning and Vulnerability Scanning

© 2012 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning 4

Basics of Security

Ports Protect Policies Probe Physical

Page 5: Computer Security Fundamentals by Chuck Easttom Chapter 11 Network Scanning and Vulnerability Scanning

© 2012 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning 5

MBSA

Microsoft Baseline Security Analyzer

Page 6: Computer Security Fundamentals by Chuck Easttom Chapter 11 Network Scanning and Vulnerability Scanning

© 2012 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning 6

Nessus

Popular Vulnerability Scanner

Page 7: Computer Security Fundamentals by Chuck Easttom Chapter 11 Network Scanning and Vulnerability Scanning

© 2012 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning 7

Getting Professional Help

Certification Education Experience Background Checks

Page 8: Computer Security Fundamentals by Chuck Easttom Chapter 11 Network Scanning and Vulnerability Scanning

Certifications

CEH CISSP Security+ Vendor-specific (Microsoft, Cisco, and so on) GAIC

© 2012 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning 8

Page 9: Computer Security Fundamentals by Chuck Easttom Chapter 11 Network Scanning and Vulnerability Scanning

Education

Computer Science Engineering Computer Information Systems Security Degrees

© 2012 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning 9

Page 10: Computer Security Fundamentals by Chuck Easttom Chapter 11 Network Scanning and Vulnerability Scanning

Background and Experience

Prior Security Experience Criminal Background Check Credit Check References Check

© 2012 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning 10

Page 11: Computer Security Fundamentals by Chuck Easttom Chapter 11 Network Scanning and Vulnerability Scanning

© 2012 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning 11

Summary

Information The more information you have about the

vulnerabilities and weaknesses of your system, the better prepared you are to defend it.

The more information the hacker has about your system’s vulnerabilities and weaknesses, the sooner it will be violated.

The tools in this chapter are for the network and security administrator and are to be used for legal, not illegal, purposes.