Welcome, Guest: Register On Nairaland / LOGIN! / Trending / Recent / New
Stats: 3,150,532 members, 7,808,954 topics. Date: Thursday, 25 April 2024 at 07:56 PM

Is Vulnerability Management Necessary? - Science/Technology - Nairaland

Nairaland Forum / Science/Technology / Is Vulnerability Management Necessary? (544 Views)

Understanding Bridal Showers; Is It Necessary? / Google Discloses Windows Vulnerability That Windows Fails To Patch Again! (2) (3) (4)

(1) (Reply)

Is Vulnerability Management Necessary? by ethnosadex: 4:25pm On Nov 20, 2015
No single security solution can make a network safe from all attacks. Firewalls and IPS can't keep workstations free of viruses and malware. Antivirus can't protect the data on a database server. So it's a matter of balancing multiple solutions. To understand how these solutions complement each other, let's look at some of the most common security solutions (this is only a partial list).
Peripheral Solutions

These solutions focus on the attack itself, by preventing unauthorized access to network assets.
 Firewall - performing network access control at the network border. Challenges include http, which is passed, and the employee supplied device boom.
 Antivirus/Antispyware - Exponential increase in signatures is pushing AV toward the limit.
 Intrusion Detection and Prevention Systems - IPS and IDS is also involved with a constantly evolving set of rules so that vital traffic is passed and bad packets are blocked.
Internal Solutions
Attackers are looking for network weaknesses, and these solutions focus on finding the weaknesses first and fixing them.
 Vulnerability Assessment - Network scanners, port scanners, IP scanners and network mappers can all assist in the detection of network assets and weaknesses.
 Vulnerability Assessment and Management - Vulnerability Management solutions first assess the network, then provide several ways to prioritize the weaknesses discovered so that the most important can be addressed first.

Vulnerability Management, an Essential Piece of the Security Puzzle

Attacks resulting in data loss are usually performed by exploiting know and well documented security vulnerabilities in software, network infrastructure, servers, workstations, phone systems, printers and employee devices.
Security flaws are constantly addressed by the vendors who issue security patches and updates on an ongoing basis. In even modest size networks making sure that all assets are running all the security patches can be a nightmare. A single host that that is missing patches or that didn't get patches installed correctly can compromise the security of the network.
There are degrees of compromise, as not all vulnerabilities are created equal and not all assets are of equal importance or are equally available to a hacker's access. That is where good management comes in. No security effort has an unlimited budget, so vulnerability management helps focus the available resources on the most serious issues that exists at any one moment.
Omitting Vulnerability Management is like securing your house with a sophisticated alarm system but without locking every door and window before going on vacation. This is a vast oversimplification because networks have many hosts and each one of them has dozens of potential issues.

How Does Vulnerability Management Complement Other Security Solutions?

Every known peripheral (packet watching) security solution can be avoided under the right circumstances, but with proper vulnerability management in place, such as AVDS, the attacker who gains admittance to the network will not find internal weaknesses to take advantage of. Here are some examples:

 Firewall - Attackers will always try to use a legitimate network access, and will eventually bypassing the firewall. Vulnerability Management finds and helps repair the vulnerabilities that attackers are searching for. If you have no serious vulnerabilities in important assets, then your chances of data loss and dependence on perfect firewall management is reduced.
 Intrusion Detection and Prevention Systems - The ideal IPS installation, with careful maintenance and using the strictest rules possible, will stop 99.9% of malicious packets. Given that even modest networks get thousands a day that means that only dozens get through under these idea circumstances. However such strict settings also captures a great number of valid packets and false positive rates can exceed double digit percentages. The nearly universal solution in IPS is to stop using the strictest rules and so stop only 99% of the real attacks. Thus in real world IPS installations network assets get hundreds of attack attempts and ensuring that they are free of vulnerabilities though VAM becomes vital.
 Antivirus - Antivirus studies incoming packets, not the system itself to see if there is a weakness that malicious code can exploit. VAM finds the vulnerabilities and helps you eliminate them. As such, AVDS complements anti-virus software in protecting the system.
It is important to understand that all the perimeter security solutions can be bypassed under relatively common circumstances. Those circumstances include incomplete or improper installation or settings.
Thus, only by hardening each individual network asset can network security be improved with confidence.
Introduction to AVDS

AVDS scans automatically and in the background on a regular basis for all systems that “talk” IP- testing for both external facing systems and internal networks.
AVDS was built to protect the critical areas of your network by mapping and scoring your network. It gives you a simple step by step workflow showing which part of your network and which systems are most vulnerable to attack and where to start prioritizing your resources to make your networks safe.

Among the advantages of AVDS are:
• Consolidated reporting methods
• Special Calculated Remediation reporting features to ensure any remediation work is done in the easiest and most efficient way.
• Customized Reporting, get the information that important for you
• Accuracy (less than .01% false positive rate) - please see the following link: http://www.beyondsecurity.com/va_accuracy_false_positive_negative.html
• Another strong feature of AVDS is through a single interface you can scan and test both network and web applications. It's custom web-application module which includes an integrated crawler that tests every page of your site and every possible entry point against every family of security risk. It is essentially the most in-depth, automated testing tool, testing for all of the known code vulnerabilities such as SQL Injection, XSS (Cross Site Scripting), File Disclosure, Remote File Inclusion, PHP/ASP Code Injection, and Directory Traversal....

See Video:
https://www.youtube.com/watch?v=tZdER2Quiy0

If you have any questions or need a free trial licence for AVDS, please feel free to contact us on; ethnos@ethnosit.net, aa@ethnosit.net
Re: Is Vulnerability Management Necessary? by handsespen: 11:12am On Mar 05, 2018
Effect of Distributed Firewall in Managing Data Security in Local Area Network

Firewalls are the first front line defense mechanism against intruders; a firewall system can operate at five of the seven layers of the OSI reference model. However, most firewall systems operate at only four layers: the data link, network, transport, and, possibly, application layers. Based on the simplicity or complexity of a firewall product or solution, the number of layers covered varies.....

http://www.scharticles.com/effect-of-distributed-firewall-in-managing-data-security-in-local-area-network/

(1) (Reply)

Unique 808nm Infrared Laser Pointer / Why Are 600 Million Africans Still Without Power? - CNN / Why Banks Need To Push The Mobile Money Platform.

(Go Up)

Sections: politics (1) business autos (1) jobs (1) career education (1) romance computers phones travel sports fashion health
religion celebs tv-movies music-radio literature webmasters programming techmarket

Links: (1) (2) (3) (4) (5) (6) (7) (8) (9) (10)

Nairaland - Copyright © 2005 - 2024 Oluwaseun Osewa. All rights reserved. See How To Advertise. 22
Disclaimer: Every Nairaland member is solely responsible for anything that he/she posts or uploads on Nairaland.