Principles of Cyber Security

Principles of Cyber  Security
Slide Note
Embed
Share

Vulnerability scanning is a crucial aspect of cybersecurity, involving frequent scans to detect vulnerabilities and enhance security. Learn how to conduct scans, use data management tools, and understand the importance of continuous monitoring.

  • Cybersecurity
  • Vulnerability Scanning
  • Data Management
  • Threat Hunting
  • Security Tools

Uploaded on Feb 18, 2025 | 0 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

You are allowed to download the files provided on this website for personal or commercial use, subject to the condition that they are used lawfully. All files are the property of their respective owners.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.

E N D

Presentation Transcript


  1. Principles of Cyber Security Lecture Lecture 13 13: : Vulnerability Scanning Dr. Dr. Muamer Muamer Mohammed Mohammed 1

  2. Objectives 10.1 To describe the Vulnerability Scanning and Data Management Tools.

  3. Vulnerability Scanning Vulnerability scanning in some ways complements pen testing Studying vulnerability scanning involves understanding: What it is How to conduct a scan How to use data management tools How threat hunting can enhance scanning 3

  4. Conducting a Vulnerability Scan A penetration test is a single event using a manual process often performed only after a specific amount of time has passed. A vulnerability scan is a frequent and ongoing process that continuously identifies vulnerabilities and monitors cybersecurity progress. 4

  5. Conducting a Vulnerability Scan Conducting a vulnerability scan involves: Knowing what to scan and how often Selecting a type of scan Interpreting vulnerability information When and What to Scan Two primary reasons for not conducting around-the-clock vulnerability scans: -Workflow interruptions -Technical constraints A more focused approach is to know the location of data so that specific systems with high-value data can be scanned more frequently 5

  6. Conducting a Vulnerability Scan 6

  7. Data Management Tools Two data management tools are used for collecting and analyzing vulnerability scan data: Security Information and Event Management (SIEM) Security Orchestration, Automation, and Response (SOAR) Security Information and Event Management (SIEM) 7

  8. Data Management Tools 8

  9. Summary Two data management tools are used for collecting and analyzing data: the Security Information and Event Management (SIEM) tool and a Security Orchestration, Automation, and Response (SOAR) tool. 9

  10. Thank you 10

More Related Content