- Network Scanning Cookbook
- Sairam Jetty
- 392字
- 2021-08-13 15:14:20
Response
Once a Network Vulnerability Scan report is obtained, it is important to devise a mitigation plan to mitigate all the vulnerabilities highlighted as part of the report. The following are a few solutions that can be part of the Network Security Scan report:
- Close unwanted ports and disable unwanted services
- Use strong and uncommon passwords
- Always apply latest patches and updates
- Uninstall or update older versions of software
- Disable legacy and old protocols in use
- Use strong algorithms and authentication mechanism
The report needs to be compiled based on the findings, and tasks are to be assigned to the respective departments. For example, all the Windows-related vulnerabilities are to be mitigated by the respective team that is responsible for maintaining Windows machines. Once the responsibilities have been sorted across the teams, the teams are expected to perform an impact and feasibility analysis on the solution provided in the report. The teams have to check the solutions against the security objectives, confidentiality, integrity, and availability. These mitigations can be used as a baseline to create hardening documents, including any other available baselines in public or private domains.
Once the solutions have been implemented on the affected hosts, it is important for the team to include these recommended remediations into the existing policies in order to avoid misconfiguration in the future. These policies are to be updated from time to time in order to be in line with the current security standards.
Any organization or individual needs to comply and create a cycle of the following activities to achieve its information security objective:
- Vulnerability assessment
- Mitigation analysis
- Patch, update, and mitigate
A vulnerability assessment as mentioned previously will result in all the open gaps present in the network, after which mitigation analysis is required to understand the remediations that must be implemented and also to perform a feasibility check on whether it would have any impact on the continuity of the network components. Once all the remediations have been identified, implement the remediations and jump to step 1. This cycle, if performed quarterly, could ensure maximum protection to your network.
- 通信工程施工工藝手冊(cè)
- 西門(mén)子SINAMICS G120/S120變頻器技術(shù)與應(yīng)用
- 雷達(dá)目標(biāo)特性及MATLAB仿真
- 信息論基礎(chǔ)(第2版)
- Multisim 10電路仿真技術(shù)應(yīng)用
- 一起玩電子:電子制作入門(mén)、拓展全攻略
- 5G網(wǎng)絡(luò)技術(shù)與業(yè)務(wù)應(yīng)用
- TD-LTE無(wú)線網(wǎng)絡(luò)規(guī)劃與優(yōu)化實(shí)務(wù)
- 天地一體化信息網(wǎng)絡(luò)架構(gòu)與技術(shù)
- 數(shù)據(jù)虛擬化:多源異構(gòu)數(shù)據(jù)集成之道
- 陣列信號(hào)處理及MATLAB實(shí)現(xiàn)(第2版)
- 5G網(wǎng)絡(luò)全專(zhuān)業(yè)規(guī)劃設(shè)計(jì)寶典
- 光波分復(fù)用系統(tǒng)與維護(hù)
- 不可不知的36種電子元器件
- 第三代移動(dòng)通信技術(shù)(第2版)