官术网_书友最值得收藏!

Complexity

Today's network environments have a complex structure consisting of firewalls, DMZ, and network devices such as switches and routers. These devices consist of complex access lists and virtual network configurations, which makes it difficult to generalize any activity. A shift in any of the preceding configurations could result in a change of the architecture of the whole network.

If we are looking to perform an IP-based scan on any of the network components, we have to be sure that all the data packets generated are reaching the destination intact and are not being impacted by any of the devices or solutions in between. For example, if Alice is scanning Bob's computer over the network and both of them are separated by a firewall, where Bob's subnet is configured to be in WAN Ping Block Mode as a part of which ping packets will be identified and dropped at the firewall level, Alice's host discovery scans for Bob's computer will result in a false positive that machine is not live.

In order to perform a successful security profiling using a Network Vulnerability Scan, the following factors need to be considered:

  • Scope of the scan
  • Network architecture
  • Network access
主站蜘蛛池模板: 庄浪县| 泰宁县| 黄大仙区| 林芝县| 凯里市| 阳西县| 桂林市| 漳浦县| 根河市| 平安县| 桐梓县| 丹凤县| 白玉县| 安丘市| 平武县| 芮城县| 龙川县| 南华县| 滁州市| 黎平县| 马龙县| 江北区| 成安县| 阜阳市| 民权县| 海南省| 东乡族自治县| 公主岭市| 云浮市| 华阴市| 逊克县| 宜章县| 屏山县| 修文县| 谷城县| 百色市| 碌曲县| 石泉县| 澎湖县| 连山| 定西市|