Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Sign up!
EnGarde Community
What is the most important Linux security technology?
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Latest Newsletters
Linux Advisory Watch: March 27th, 2015
Linux Security Week: March 23rd, 2015
LinuxSecurity Newsletters
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

From SATAN to OVAL: The Evolution of Vulnerability Assessment Print E-mail
User Rating:      How can I rate this item?
Source: Security Park - Posted by Pax Dickinson   
Network Security With the growing reliance and dependence on our inter-connected world, security vulnerabilities are a real world issue requiring focus and attention. Security vulnerabilities are the path to security breaches and originate from many different areas - incorrectly configured systems, unchanged default passwords, product flaws, or missing security patches to name a few. The comprehensive and accurate identification and remediation of security vulnerabilities is a key requirement to mitigate security risk for enterprises.

Vulnerability assessment technology has evolved significantly since the initial release of SATAN about a decade ago. SATAN was a dictionary based UNIX security testing tool designed to help system administrators identifying common security problems. Second generation vulnerability scanners built upon hard-coded decision trees followed shortly. Predefined decision trees allowed minimizing the necessary probes depending on operating system and application. Their lack of flexibility however made them quickly obsolete.

Modern scanner architectures are built as inference based systems, not requiring any agent software on the target systems. They learn about each target system individually while selective probes are being exchanged with the target system. The inference based architecture is centred around highly multi-threaded engines for scanning thousands of vulnerabilities simultaneously on any system on a network. Modern scanner architectures also support multiple levels (trusted and un-trusted) of vulnerability assessment against any given target system. Un-trusted vulnerability assessments simulate the scenario of an attacker without prior knowledge about the target system, while trusted assessments leverage credentials to log into the target systems for auditing configuration and patch information. An important criterion for measuring the effectiveness of a vulnerability scanner is the comprehensiveness and accuracy of its vulnerability knowledge base. Also, the ability to report and communicate vulnerability findings in a standardized manner from the vulnerability scanner to other applications (i.e. patch distribution or configuration management) is a critical requirement.

Read this full article at Security Park

Only registered users can write comments.
Please login or register.

Powered by AkoComment!

< Prev   Next >


Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
FBI Quietly Removes Recommendation To Encrypt Your Phone
And the prize for LEAST SECURE BROWSER goes to ... Chrome!
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2015 Guardian Digital, Inc. All rights reserved.