漏洞扫描

Abbas Moallem
{"title":"漏洞扫描","authors":"Abbas Moallem","doi":"10.1002/9781119549420.ch4","DOIUrl":null,"url":null,"abstract":"- Scientific advances of higher education institutions make them attractive targets for malicious cyberattacks. Modern scanners such as Nessus and Burp can pinpoint an organization’s vulnerabilities for subsequent mitigation. However, the correction reports generated from the tools typically cause important info overload whereas failing to produce unjust solutions. Consequently, higher education institutions lack the appropriate knowledge to improve their cybersecurity posture. However, while not understanding vulnerabilities in a very system, it would be difficult to conduct successful network defence in order to prevent intruders in the real world. Therefore, vulnerability scanning is a key element to the success of cybersecurity curriculum. In this paper, we tend to review the state of the art of current open source vulnerability scanning tools. Literature survey is done on vulnerability, vulnerability scanning, vulnerability scanning tools, security vulnerabilities, system security and application security, malicious cyber-attacks shows that a lot of work is being carried out in vulnerability assessment and reporting. In this report gives exhaustive study on vulnerability scanning tools. We presented two main aspects in this paper vulnerability scanning and reporting. Then we identify the gaps in relevant practices and presenting selected results, we highlight future directions and conclude this research. We provide thorough descriptions on the top open source network vulnerability scanning tools. We then propose our hands-on labs research design in detail on network vulnerability scanning that we design specifically to enhance the cybersecurity curriculum.","PeriodicalId":345523,"journal":{"name":"CompTIA® PenTest+ Study Guide","volume":"36 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Vulnerability Scanning\",\"authors\":\"Abbas Moallem\",\"doi\":\"10.1002/9781119549420.ch4\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"- Scientific advances of higher education institutions make them attractive targets for malicious cyberattacks. Modern scanners such as Nessus and Burp can pinpoint an organization’s vulnerabilities for subsequent mitigation. However, the correction reports generated from the tools typically cause important info overload whereas failing to produce unjust solutions. Consequently, higher education institutions lack the appropriate knowledge to improve their cybersecurity posture. However, while not understanding vulnerabilities in a very system, it would be difficult to conduct successful network defence in order to prevent intruders in the real world. Therefore, vulnerability scanning is a key element to the success of cybersecurity curriculum. In this paper, we tend to review the state of the art of current open source vulnerability scanning tools. Literature survey is done on vulnerability, vulnerability scanning, vulnerability scanning tools, security vulnerabilities, system security and application security, malicious cyber-attacks shows that a lot of work is being carried out in vulnerability assessment and reporting. In this report gives exhaustive study on vulnerability scanning tools. We presented two main aspects in this paper vulnerability scanning and reporting. Then we identify the gaps in relevant practices and presenting selected results, we highlight future directions and conclude this research. We provide thorough descriptions on the top open source network vulnerability scanning tools. We then propose our hands-on labs research design in detail on network vulnerability scanning that we design specifically to enhance the cybersecurity curriculum.\",\"PeriodicalId\":345523,\"journal\":{\"name\":\"CompTIA® PenTest+ Study Guide\",\"volume\":\"36 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-10-18\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"CompTIA® PenTest+ Study Guide\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1002/9781119549420.ch4\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"CompTIA® PenTest+ Study Guide","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1002/9781119549420.ch4","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4

摘要

-高等教育机构的科学进步使其成为恶意网络攻击的目标。Nessus和Burp等现代扫描器可以查明组织的漏洞,以便随后进行缓解。然而,由工具生成的更正报告通常会导致重要的信息过载,而无法生成不公正的解决方案。因此,高等教育机构缺乏适当的知识来改善其网络安全态势。然而,如果不了解系统中的漏洞,就很难在现实世界中进行成功的网络防御,以防止入侵者。因此,漏洞扫描是网络安全课程成功的关键因素。在本文中,我们倾向于回顾当前开源漏洞扫描工具的艺术状态。对漏洞、漏洞扫描、漏洞扫描工具、安全漏洞、系统安全和应用程序安全、恶意网络攻击等方面进行了文献调查,在漏洞评估和报告方面开展了大量工作。本报告对漏洞扫描工具进行了详尽的研究。本文主要介绍了漏洞扫描和报告两个方面。然后,我们找出相关实践的差距,并提出了选择的结果,我们强调了未来的方向,并总结了本研究。我们提供了对顶级开源网络漏洞扫描工具的详细描述。然后,我们提出了我们的动手实验室研究设计,详细介绍了我们专门设计的网络漏洞扫描,以增强网络安全课程。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Vulnerability Scanning
- Scientific advances of higher education institutions make them attractive targets for malicious cyberattacks. Modern scanners such as Nessus and Burp can pinpoint an organization’s vulnerabilities for subsequent mitigation. However, the correction reports generated from the tools typically cause important info overload whereas failing to produce unjust solutions. Consequently, higher education institutions lack the appropriate knowledge to improve their cybersecurity posture. However, while not understanding vulnerabilities in a very system, it would be difficult to conduct successful network defence in order to prevent intruders in the real world. Therefore, vulnerability scanning is a key element to the success of cybersecurity curriculum. In this paper, we tend to review the state of the art of current open source vulnerability scanning tools. Literature survey is done on vulnerability, vulnerability scanning, vulnerability scanning tools, security vulnerabilities, system security and application security, malicious cyber-attacks shows that a lot of work is being carried out in vulnerability assessment and reporting. In this report gives exhaustive study on vulnerability scanning tools. We presented two main aspects in this paper vulnerability scanning and reporting. Then we identify the gaps in relevant practices and presenting selected results, we highlight future directions and conclude this research. We provide thorough descriptions on the top open source network vulnerability scanning tools. We then propose our hands-on labs research design in detail on network vulnerability scanning that we design specifically to enhance the cybersecurity curriculum.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Index Scripting for Penetration Testing Reporting and Communication Exploiting Application Vulnerabilities Exploiting Network Vulnerabilities
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1