From the course: Ethical Hacking: Vulnerability Analysis

Unlock the full course today

Join today to access over 24,700 courses taught by industry experts.

Assessing vulnerabilities

Assessing vulnerabilities

- [Instructor] Assessing vulnerabilities is the first step in decreasing overall organizational risk, and involves various tools and techniques. In this segment, we'll compare the different types of scans along with what type to use according to the objectives of the scan. First, let's talk about what we are evaluating when assessing vulnerabilities. An enterprise network is complicated and can be thought of in two separate areas. Information systems and information technology. Information systems is the software side, this ensures data availability and it drives business processes and decision making. It includes database management, management information, and decision support systems. Information technology commonly refers to the hardware side, including all computers and networking devices within. Both sides work together in an organization, and both should be assessed for vulnerabilities. Next, let's talk about what it means to conduct a vulnerability assessment exercise. First…

Contents