• Tidak ada hasil yang ditemukan

Chapter4.ppt 188KB Jun 23 2011 10:21:02 AM

N/A
N/A
Protected

Academic year: 2017

Membagikan "Chapter4.ppt 188KB Jun 23 2011 10:21:02 AM"

Copied!
27
0
0

Teks penuh

(1)

Chapter 4: Computer Network

Chapter 4: Computer Network

Vulnerabilities

Vulnerabilities

(2)

Kizza - Computer Network 2

Sources of Vulnerabilities

Sources of Vulnerabilities

There is no definitive list of all possible

There is no definitive list of all possible

sources of these system vulnerabilities

sources of these system vulnerabilities

Among the most frequently mentioned

Among the most frequently mentioned

sources of security vulnerability problems in

sources of security vulnerability problems in

computer networks are

computer networks are

design flaws,

design flaws,

poor security management,

poor security management,

incorrect implementation,

incorrect implementation,

Internet technology vulnerability,

Internet technology vulnerability,

the nature of intruder activity,

the nature of intruder activity,

the difficulty of fixing vulnerable systems,

the difficulty of fixing vulnerable systems,

(3)

Kizza - Computer Network 3

Computer Network Vulnerabilities

Computer Network Vulnerabilities

System vulnerabilities are weaknesses

System vulnerabilities are weaknesses

in the software or hardware on a

in the software or hardware on a

server or a client that can be exploited

server or a client that can be exploited

by a determined intruder to gain

by a determined intruder to gain

access to or shut down a network.

access to or shut down a network.

A system vulnerability is a condition, a

A system vulnerability is a condition, a

weakness of or an absence of security

weakness of or an absence of security

procedure, or technical, physical, or

procedure, or technical, physical, or

other controls that could be exploited

other controls that could be exploited

(4)

Kizza - Computer Network 4

Design Flaws

Design Flaws

The two major components of a computer

The two major components of a computer

system, hardware and software, quite often

system, hardware and software, quite often

have design flaws

have design flaws

Hardware systems are less susceptible to

Hardware systems are less susceptible to

design flaws than their software counterparts

design flaws than their software counterparts

owing to less complexity and the long history

owing to less complexity and the long history

of hardware engineering.

of hardware engineering.

But even with all these factors backing up

But even with all these factors backing up

hardware engineering, design flaws are still

hardware engineering, design flaws are still

common.

common.

But the biggest problems in system security

But the biggest problems in system security

(5)

Kizza - Computer Network 5

three major factors contribute a great

three major factors contribute a great

deal to software design flaws:

deal to software design flaws:

human factors,

human factors,

software complexity,

software complexity,

(6)

Kizza - Computer Network 6

Human Factors - Poor software performance

Human Factors - Poor software performance

can be a result of:

can be a result of:

Memory lapses and attentional failures

Memory lapses and attentional failures

: For

: For

example, someone was supposed to have removed

example, someone was supposed to have removed

or added a line of code, tested, or verified but did

or added a line of code, tested, or verified but did

not because of simple forgetfulness.

not because of simple forgetfulness.

Rush to finish

Rush to finish

: The result of pressure, most often

: The result of pressure, most often

from management, to get the product on the

from management, to get the product on the

market either to cut development costs or to meet

market either to cut development costs or to meet

a client deadline can cause problems.

a client deadline can cause problems.

Overconfidence and use of nonstandard or

Overconfidence and use of nonstandard or

untested algorithms

untested algorithms

: Before algorithms are fully

: Before algorithms are fully

tested by peers, they are put into the product line

tested by peers, they are put into the product line

because they seem to have worked on a few test

because they seem to have worked on a few test

runs.

(7)

Kizza - Computer Network 7

Malice

Malice

: Software developers, like any other

: Software developers, like any other

professionals, have malicious people in their

professionals, have malicious people in their

ranks. Bugs, viruses, and worms have been

ranks. Bugs, viruses, and worms have been

known to be embedded and downloaded in

known to be embedded and downloaded in

software, as is the case with Trojan horse

software, as is the case with Trojan horse

software, which boots itself at a timed location.

software, which boots itself at a timed location.

Complacency

Complacency

: When either an individual or a

: When either an individual or a

software producer has significant experience in

software producer has significant experience in

software development, it is easy to overlook

software development, it is easy to overlook

certain testing and other error control

certain testing and other error control

measures in those parts of software that were

measures in those parts of software that were

tested previously in a similar or related

tested previously in a similar or related

product, forgetting that no one software

product, forgetting that no one software

product can conform to all requirements in all

product can conform to all requirements in all

environments.

(8)

Kizza - Computer Network 8

Software Complexity - Professionals and

Software Complexity - Professionals and

nonprofessionals who use software know the

nonprofessionals who use software know the

differences between software programming and

differences between software programming and

hardware engineering. It is in these differences that

hardware engineering. It is in these differences that

underlie many of the causes of software failure and

underlie many of the causes of software failure and

poor performance. Consider the following:

poor performance. Consider the following:

Complexity: Unlike hardwired programming in which it is easy Complexity: Unlike hardwired programming in which it is easy

to exhaust the possible outcomes on a given set of input

to exhaust the possible outcomes on a given set of input

sequences, in software programming a similar program may

sequences, in software programming a similar program may

present billions of possible outcomes on the same input

present billions of possible outcomes on the same input

sequence.

sequence.

Difficult testing: There will never be a complete set of test Difficult testing: There will never be a complete set of test

programs to check software exhaustively for all bugs for a

programs to check software exhaustively for all bugs for a

given input sequence.

given input sequence.

Ease of programmingEase of programming: The fact that software programming is : The fact that software programming is easy to learn encourages many people with little formal

easy to learn encourages many people with little formal

training and education in the field to start developing

training and education in the field to start developing

programs, but many are not knowledgeable about good

programs, but many are not knowledgeable about good

programming practices or able to check for errors.

programming practices or able to check for errors.

Misunderstanding of basic design specificationsMisunderstanding of basic design specifications: This affects : This affects the subsequent design phases including coding, documenting,

the subsequent design phases including coding, documenting,

and testing. It also results in improper and ambiguous

and testing. It also results in improper and ambiguous

specifications of major components of the software and in

specifications of major components of the software and in

ill-chosen and poorly defined internal program structures.

(9)

Kizza - Computer Network 9

Trustworthy Software Sources –

Trustworthy Software Sources –

– There are thousands of software sources for the millions of There are thousands of software sources for the millions of software products on the market today. However, if we were software products on the market today. However, if we were

required to name well known software producers, very few of us required to name well known software producers, very few of us would succeed in naming more than a handful. Yet we buy

would succeed in naming more than a handful. Yet we buy software products every day without even ever minding their software products every day without even ever minding their sources. Most important, we do not care about the quality of sources. Most important, we do not care about the quality of that software, the honesty of the anonymous programmer, and that software, the honesty of the anonymous programmer, and of course the reliability of it as long as it does what we want it to of course the reliability of it as long as it does what we want it to do.

do.

– Even if we want to trace the authorship of the software product, Even if we want to trace the authorship of the software product, it is impossible because software companies are closed within it is impossible because software companies are closed within months of their opening. Chances are when a software product is months of their opening. Chances are when a software product is 2 years old, its producer is likely to be out of business. In

2 years old, its producer is likely to be out of business. In

addition to the difficulties in tracing the producers of software addition to the difficulties in tracing the producers of software who go out of business as fast as they come in, there is also fear who go out of business as fast as they come in, there is also fear that such software may not even have been tested at all.

that such software may not even have been tested at all.

– The growth of the Internet and the escalating costs of software The growth of the Internet and the escalating costs of software production have led many small in-house software developers to production have led many small in-house software developers to use the marketplace as a giant testing laboratory through the use the marketplace as a giant testing laboratory through the use of beta testing, shareware, and freeware. Shareware and use of beta testing, shareware, and freeware. Shareware and freeware have a high potential of bringing hostile code into freeware have a high potential of bringing hostile code into trusted systems.

(10)

Kizza - Computer Network 10

Software Re-Use, Re-engineering, and Outlived

Software Re-Use, Re-engineering, and Outlived

Design

Design

New developments in software engineering are

New developments in software engineering are

spearheading new developments such as software

spearheading new developments such as software

use and software engineering. Software

use and software engineering. Software

re-use is the integration and re-use of software assets

use is the integration and use of software assets

from a previously developed system. It is the

from a previously developed system. It is the

process in which old or updated software such as

process in which old or updated software such as

library, component, requirements and design

library, component, requirements and design

documents, and design patterns is used along

documents, and design patterns is used along

with new software.

with new software.

Both software re-engineering and re-use are hailed

Both software re-engineering and re-use are hailed

for cutting down on the escalating development

for cutting down on the escalating development

and testing costs. They have brought

and testing costs. They have brought

efficiency by

efficiency by

reducing time spent designing or coding,

reducing time spent designing or coding,

popularized standardization, and led to common

popularized standardization, and led to common

“look-and-feel” between applications. They have

“look-and-feel” between applications. They have

made debugging easier through use of thoroughly

made debugging easier through use of thoroughly

(11)

Kizza - Computer Network 11

Poor Security Management

Poor Security Management

Security management is both a technical and an administrative Security management is both a technical and an administrative security process that involves security policies and controls that the security process that involves security policies and controls that the organization decides to put in place to provide the required level of organization decides to put in place to provide the required level of protection. In addition, it also involves security monitoring and protection. In addition, it also involves security monitoring and evaluation of the effectiveness of those policies.

evaluation of the effectiveness of those policies.

The most effective way to meet those goals is to implement security The most effective way to meet those goals is to implement security risk assessment through a security policy and securing access to risk assessment through a security policy and securing access to network resources through the use of firewalls and strong

network resources through the use of firewalls and strong

cryptography. These and others offer the security required for the cryptography. These and others offer the security required for the different information systems in the organization in terms of

different information systems in the organization in terms of integrity, confidentiality, and availability of that information. integrity, confidentiality, and availability of that information.

Security management by itself is a complex process; however, if it is Security management by itself is a complex process; however, if it is not well organized it can result in a security nightmare for the

not well organized it can result in a security nightmare for the organization.

organization.

Poor security management is a result of little control over security Poor security management is a result of little control over security implementation, administration, and monitoring. It is a failure in implementation, administration, and monitoring. It is a failure in

having solid control of the security situation of the organization when having solid control of the security situation of the organization when the security administrator does not know who is setting the

the security administrator does not know who is setting the

organization’s security policy, administering security compliance, and organization’s security policy, administering security compliance, and who manages system security configurations and is in charge of

who manages system security configurations and is in charge of security event and incident handling.

(12)

Kizza - Computer Network 12

Good security management is made up of a number of

Good security management is made up of a number of

implementable security components that include

implementable security components that include

risk management, risk management,

information security policies and procedures, information security policies and procedures,

standards, guidelines, standards, guidelines, information classification, information classification, security monitoring, security monitoring, security education. security education.

– These core components serve to protect the organization’s These core components serve to protect the organization’s resources.

resources.

– A risk analysis will identify these assets, discover the threats A risk analysis will identify these assets, discover the threats that put them at risk, and estimate the possible damage and that put them at risk, and estimate the possible damage and potential loss a company could endure if any of these threats potential loss a company could endure if any of these threats become real. The results of the risk analysis help management become real. The results of the risk analysis help management construct a budget with the necessary funds to protect the

construct a budget with the necessary funds to protect the recognized assets from their identified threats and develop recognized assets from their identified threats and develop applicable security policies that provide direction for security applicable security policies that provide direction for security activities. Security education takes this information to each and activities. Security education takes this information to each and every employee.

every employee.

– Security policies and procedures to create, implement, and Security policies and procedures to create, implement, and enforce security issues that may include people and

enforce security issues that may include people and technology.

technology.

– Standards and guidelines to find ways, including automated Standards and guidelines to find ways, including automated solution for creating, updating, and tracking compliance of solution for creating, updating, and tracking compliance of security policies across the organization.

(13)

Kizza - Computer Network 13

Information classification to manage the

Information classification to manage the

search, identification, and reduction of

search, identification, and reduction of

system vulnerabilities by establishing

system vulnerabilities by establishing

security configurations.

security configurations.

Security monitoring to prevent and detect

Security monitoring to prevent and detect

intrusions, consolidate event logs for future

intrusions, consolidate event logs for future

log and trend analysis, manage security

log and trend analysis, manage security

events in real-time, manage parameter

events in real-time, manage parameter

security including multiple firewall

security including multiple firewall

reporting systems, and analyze security

reporting systems, and analyze security

events enterprise-wide.

events enterprise-wide.

Security education to bring security

Security education to bring security

awareness to every employee of the

awareness to every employee of the

organization and teach them their

organization and teach them their

individual security responsibility.

(14)

Kizza - Computer Network 14

Incorrect Implementation

Incorrect Implementation

Incorrect implantation very often is a result of

Incorrect implantation very often is a result of

incompatible interfaces. Two product modules

incompatible interfaces. Two product modules

can be deployed and work together only if they

can be deployed and work together only if they

are compatible. That means that the module

are compatible. That means that the module

must be

must be

additive,

additive,

that is the environment of

that is the environment of

the interface needs to remain intact.

the interface needs to remain intact.

An incompatible interface, on the other hand,

An incompatible interface, on the other hand,

means that the introduction of the module

means that the introduction of the module

has changed the existing interface in such a

has changed the existing interface in such a

way that existing references to the interface

way that existing references to the interface

(15)

Kizza - Computer Network 15

Incompatibility in system interfaces

Incompatibility in system interfaces

may be cause by a variety of conditions

may be cause by a variety of conditions

usually created by things such as:

usually created by things such as:

Too much detail

Too much detail

Not enough understanding of the

Not enough understanding of the

underlying parameters

underlying parameters

Poor communication during design

Poor communication during design

Selecting the software or hardware

Selecting the software or hardware

modules before understanding the

modules before understanding the

receiving software

receiving software

(16)

Kizza - Computer Network 16

Internet Technology

Internet Technology

Vulnerability

Vulnerability

The fact that computer and telecommunication

The fact that computer and telecommunication

technologies have developed at such an amazing

technologies have developed at such an amazing

and frightening speed and people have

and frightening speed and people have

overwhelmingly embraced both of them has

overwhelmingly embraced both of them has

caused security experts to worry about the side

caused security experts to worry about the side

effects of these booming technologies.

effects of these booming technologies.

Internet technology has been and continues to be

Internet technology has been and continues to be

vulnerable. There have been reports of all sorts of

vulnerable. There have been reports of all sorts of

loopholes, weaknesses, and gaping holes in both

loopholes, weaknesses, and gaping holes in both

software and hardware technologies.

software and hardware technologies.

No one knows how many of these vulnerabilities

No one knows how many of these vulnerabilities

there are both in software and hardware. The

there are both in software and hardware. The

assumption is that there are thousands. As history

assumption is that there are thousands. As history

has shown us, a few are always discovered every

has shown us, a few are always discovered every

day by hackers

(17)

Kizza - Computer Network 17

Although the list spans both hardware and

Although the list spans both hardware and

software, the problem is more prevalent with

software, the problem is more prevalent with

software. In fact software vulnerabilities can be

software. In fact software vulnerabilities can be

put into four categories:

put into four categories:

Operating system vulnerabilities: Operating systems

Operating system vulnerabilities: Operating systems

are the main sources of all reported system

are the main sources of all reported system

vulnerabilities.

vulnerabilities.

Port-based vulnerabilities: Besides operating systems,

Port-based vulnerabilities: Besides operating systems,

network service ports take second place is sourcing

network service ports take second place is sourcing

system vulnerabilities. For system administrators,

system vulnerabilities. For system administrators,

knowing the list of most vulnerable ports can go a

knowing the list of most vulnerable ports can go a

long way to help enhance system security by blocking

long way to help enhance system security by blocking

those known ports at the firewall.

those known ports at the firewall.

Application software based errors

Application software based errors

System protocol software such as client and server

System protocol software such as client and server

browser.

(18)

Kizza - Computer Network 18

Changing Nature of Hacker

Changing Nature of Hacker

Technologies and Activities

Technologies and Activities

It is ironic that as “useful” technology develops so

It is ironic that as “useful” technology develops so

does the “bad” technology. What we call useful

does the “bad” technology. What we call useful

technology is the development in all computer and

technology is the development in all computer and

telecommunication technologies that are driving

telecommunication technologies that are driving

the Internet, telecommunication, and the Web.

the Internet, telecommunication, and the Web.

“Bad” technology is the technology that system

“Bad” technology is the technology that system

intruders are using to attack systems. Unfortunately

intruders are using to attack systems. Unfortunately

these technologies are all developing in tandem.

these technologies are all developing in tandem.

In fact there are times when it looks like hacker

In fact there are times when it looks like hacker

technologies are developing faster that the rest of

technologies are developing faster that the rest of

the technology. One thing is clear, though: hacker

the technology. One thing is clear, though: hacker

technology is flourishing.

(19)

Kizza - Computer Network 19

Difficulty of Fixing Vulnerable

Difficulty of Fixing Vulnerable

Systems

Systems

It is difficult to fix known system vulnerabilities. There is concern It is difficult to fix known system vulnerabilities. There is concern

about the ability of system administrators to cope with the number about the ability of system administrators to cope with the number

of patches issued for system vulnerabilities. As the number of of patches issued for system vulnerabilities. As the number of vulnerabilities rises, system and network administrators face a vulnerabilities rises, system and network administrators face a

difficult situation. They are challenged with keeping up with all the difficult situation. They are challenged with keeping up with all the systems they have and all the patches released for those systems. systems they have and all the patches released for those systems. Patches can be difficult to apply and might even have unexpected Patches can be difficult to apply and might even have unexpected

side effects as a result of compatibility issues [2]. side effects as a result of compatibility issues [2].

Beside the problem of keeping abreast of the number of Beside the problem of keeping abreast of the number of

vulnerabilities and the corresponding patches there are also logistic vulnerabilities and the corresponding patches there are also logistic problems between the time a vendor releases a security patch, and problems between the time a vendor releases a security patch, and

the time a system administrator fixes the vulnerable computer the time a system administrator fixes the vulnerable computer

system. system.

There are several factors affecting the quick fixing of patches. There are several factors affecting the quick fixing of patches.

Sometimes it is the logistics of the distribution of patches. Many Sometimes it is the logistics of the distribution of patches. Many

vendors disseminate the patches on their Web sites; others send vendors disseminate the patches on their Web sites; others send e-mail alerts. However, sometimes busy systems administrators do mail alerts. However, sometimes busy systems administrators do

not get around to these e-mails and security alerts until sometime not get around to these e-mails and security alerts until sometime after. Sometimes it can be months or years before the patches are after. Sometimes it can be months or years before the patches are

(20)

Kizza - Computer Network 20

Limits of Effectiveness of Reactive

Limits of Effectiveness of Reactive

Solutions

Solutions

Because just a small percentage of all attacks is

Because just a small percentage of all attacks is

reported, this indicates a serious growing system

reported, this indicates a serious growing system

security problem.

security problem.

Urgent action is needed to find an effective solution to

Urgent action is needed to find an effective solution to

this monstrous problem.

this monstrous problem.

The security community, including scrupulous vendors,

The security community, including scrupulous vendors,

have come up with various solutions, some good and

have come up with various solutions, some good and

others not. In fact, in an unexpected reversal of

others not. In fact, in an unexpected reversal of

fortunes one of the new security problems is to find a

fortunes one of the new security problems is to find a

“good” solution from among thousands of solutions and

“good” solution from among thousands of solutions and

to find an “expert” security option from the many

to find an “expert” security option from the many

different views.

different views.

Are we reaching the limits of our efforts, as a

Are we reaching the limits of our efforts, as a

community, to come up with a few good and effective

community, to come up with a few good and effective

solutions to this security problem? There are many

solutions to this security problem? There are many

(21)

Kizza - Computer Network 21

It is clear that we are reaching the limits of effectiveness

It is clear that we are reaching the limits of effectiveness

of our reactive solutions. Richard D. Pethia gives the

of our reactive solutions. Richard D. Pethia gives the

following reasons:

following reasons:

– The number of vulnerabilities in commercial off-the-shelf The number of vulnerabilities in commercial off-the-shelf

software is now at the level that it is virtually impossible for any software is now at the level that it is virtually impossible for any but the best resourced organizations to keep up with the

but the best resourced organizations to keep up with the vulnerability fixes.

vulnerability fixes.

– The Internet now connects more than 109,000,000 computers The Internet now connects more than 109,000,000 computers and continues to grow at a rapid pace. At any point in time, there and continues to grow at a rapid pace. At any point in time, there are hundreds of thousands of connected computers that are

are hundreds of thousands of connected computers that are vulnerable to one form of attack or another.

vulnerable to one form of attack or another.

– Attack technology has now advanced to the point where it is Attack technology has now advanced to the point where it is easy for attackers to take advantage of these vulnerable

easy for attackers to take advantage of these vulnerable

machines and harness them together to launch high-powered machines and harness them together to launch high-powered attacks.

attacks.

– Many attacks are now fully automated, thus reducing the Many attacks are now fully automated, thus reducing the turnaround time even further as they spread around turnaround time even further as they spread around cyberspace.

cyberspace.

– The attack technology has become increasingly complex and in The attack technology has become increasingly complex and in some cases intentionally stealthy, thus reducing the turnaround some cases intentionally stealthy, thus reducing the turnaround time and increasing the time it takes to discover and analyze the time and increasing the time it takes to discover and analyze the attack mechanisms in order to produce antidotes.

attack mechanisms in order to produce antidotes.

(22)

Kizza - Computer Network 22

Social Engineering

Social Engineering

Social engineering is an outside hacker's use of

Social engineering is an outside hacker's use of

psychological tricks on legitimate users of a

psychological tricks on legitimate users of a

computer system, in order to gain the

computer system, in order to gain the

information (usernames and passwords) one

information (usernames and passwords) one

needs to gain access to the system.

needs to gain access to the system.

Social engineering is a diversion, in the process

Social engineering is a diversion, in the process

of system attack, on people’s intelligence to

of system attack, on people’s intelligence to

utilize two human weaknesses: first no one

utilize two human weaknesses: first no one

wants to be considered ignorant and second is

wants to be considered ignorant and second is

human trust. Ironically these are two

human trust. Ironically these are two

weaknesses that have made social engineering

weaknesses that have made social engineering

difficult to fight because no one wants to admit

difficult to fight because no one wants to admit

falling for it. This has made social engineering

falling for it. This has made social engineering

(23)

Kizza - Computer Network 23

Vulnerability Assessment

Vulnerability Assessment

Vulnerability assessment is a process that works on

Vulnerability assessment is a process that works on

a system to identify, track, and manage the repair

a system to identify, track, and manage the repair

of vulnerabilities on the system.

of vulnerabilities on the system.

The assortment of items that are checked by this

The assortment of items that are checked by this

process in a system under review varies depending

process in a system under review varies depending

on the organization. It may include all desktops,

on the organization. It may include all desktops,

servers, routers, and firewalls.

servers, routers, and firewalls.

Most vulnerability assessment services will provide

Most vulnerability assessment services will provide

system administrators with:

system administrators with:

network mapping and system finger printing of all known

network mapping and system finger printing of all known

vulnerabilities

vulnerabilities

(24)

Kizza - Computer Network 24

A final report is always produced

A final report is always produced

detailing the findings and the best way

detailing the findings and the best way

to go about overcoming such

to go about overcoming such

vulnerabilities.

vulnerabilities.

This report consists of:

This report consists of:

prioritized recommendations for

prioritized recommendations for

mitigating or eliminating weaknesses,

mitigating or eliminating weaknesses,

based on an organization’s operational

based on an organization’s operational

schedule, it also contains

schedule, it also contains

recommendations of further

recommendations of further

reassessments of the system within given

reassessments of the system within given

(25)

Kizza - Computer Network 25

Vulnerability Assessment Services

Vulnerability Assessment Services

Due to the massive growth of the number of

Due to the massive growth of the number of

companies and organizations owning their own

companies and organizations owning their own

networks, the growth of vulnerability monitoring

networks, the growth of vulnerability monitoring

technologies, the increase in network intrusions and

technologies, the increase in network intrusions and

attacks with viruses, and world-wide publicity of such

attacks with viruses, and world-wide publicity of such

attacks, there is a growing number of companies

attacks, there is a growing number of companies

offering system vulnerability services

offering system vulnerability services

Among the services are:

Among the services are:

– Vulnerability Scanning - to provide a comprehensive security Vulnerability Scanning - to provide a comprehensive security

review of the system including both the perimeter and

review of the system including both the perimeter and

system internals. The aim of this kind of scanning is to spot

system internals. The aim of this kind of scanning is to spot

critical vulnerabilities and gaps in the system’s security

critical vulnerabilities and gaps in the system’s security

practices. Comprehensive system scanning usually results in a

practices. Comprehensive system scanning usually results in a

number of both false positives and negatives. It is the job of

number of both false positives and negatives. It is the job of

the system administrator to find ways of dealing with these

the system administrator to find ways of dealing with these

false positives and negatives. The final report produced after

false positives and negatives. The final report produced after

each scan consists of strategic advice and prioritized

each scan consists of strategic advice and prioritized

recommendations to ensure critical holes are addressed first.

(26)

Kizza - Computer Network 26

Vulnerability Assessment and Penetration

Vulnerability Assessment and Penetration

Testing - a hands-on testing of a system for

Testing - a hands-on testing of a system for

identified and unidentified vulnerabilities.

identified and unidentified vulnerabilities.

All known hacking techniques and tools are

All known hacking techniques and tools are

tested during this phase to reproduce

tested during this phase to reproduce

real-world attack scenarios. One of the

world attack scenarios. One of the

outcomes of these real-life testings is that

outcomes of these real-life testings is that

new and sometimes obscure vulnerabilities

new and sometimes obscure vulnerabilities

are found, processes and procedures of

are found, processes and procedures of

attack are identified, and sources and

attack are identified, and sources and

severity of vulnerabilities are categorized

severity of vulnerabilities are categorized

and prioritized based on the user-provided

and prioritized based on the user-provided

(27)

Kizza - Computer Network 27

Advantages of Vulnerability

Advantages of Vulnerability

Assessment Services

Assessment Services

They can, and actually always do, provide

They can, and actually always do, provide

and develop signatures and updates for new

and develop signatures and updates for new

vulnerabilities and automatically include

vulnerabilities and automatically include

them in the next scan. This eliminates the

them in the next scan. This eliminates the

need for the system administrator to

need for the system administrator to

schedule periodic updates.

schedule periodic updates.

Probably the best advantage to an

Probably the best advantage to an

overworked and many times resource

overworked and many times resource

strapped system administrator is the

strapped system administrator is the

automated and regularly scheduled scan of

automated and regularly scheduled scan of

all network resources. They provide, in

all network resources. They provide, in

addition, a badly needed third-party “security

addition, a badly needed third-party “security

eye.” thus helping the administrator to

eye.” thus helping the administrator to

provide an objective yet independent security

provide an objective yet independent security

evaluation of the

Referensi

Dokumen terkait

Sesuai Perpres 70 Tahun 2012 pasal 43 ayat 4: Pokja 4 Jasa Konsultansi dan Jasa Lainnya Daftar pendek dalam Seleksi Sederhana berjumlah 3(tiga) sampai 5 (lima) Penyedia Jasa

Berdasarkan Berita Acara Evaluasi Penawaran Nomor : 06 /POKJA I - ULP / DPU / PJOST / TJT / 2016 tanggal 14 Juli 2016 untuk Perkerjaan Peningkatan Jalan Menuju Oprit Sebelah

Membawa dokumen asli dan 1 (satu) Set Fotocopy dari data-data formulir isian kualifikasi yang diinput di dalam Sistem Pengadaan Secara Elektronik (SPSE) pada

Hasil dari penelitian ini menunjukkan bahwa pelaksanaan penerimaan kas pada Rumah Sakit Umum Daerah Andi Makkasau telah dilakukan sesuai dengan Peraturan Daerah Nomor

Cold Storage , dengan ini kami mengundang Saudara/i untuk hadir pada acara pembuktian kualifikasi dan klarifikasi harga satuan timpang dengan jadwal sebagai berikut

20 tahun 2008 pasal 1, usaha kecil adalah usaha ekonomi produktif yang berdiri sendiri, yang dilakukan oleh orang perorangan atau badan usaha yang bukan merupakan anak perusahaan

Pencemaran ini biasanya terjadi karena: kebocoran limbah cair atau bahan kimia industri atau fasilitas komersial; penggunaan pestisida; masuknya air permukaan tanah tercemar ke

Puji dan syukur penyusun panjatkan ke hadirat Allah SWT atas segala rahmat dan hidayah-Nya sehingga penulis mampu menyelesaikan skripsi/tugas akhir dengan judul “ Stabilisasi