This means scanning the target network to see which hosts are live and which TCP/UDP ports are open on the remote hosts.īy getting as much knowledge as possible about the open ports (i.e which services are running on the remote hosts) you can proceed with finding possible vulnerabilities, misconfigured services etc. The first phase of a security assessment job is to discover your possible targets over the network. One of the tasks I’m responsible to do in my work environment is to either coordinate or perform network assessment projects on my own.Ī major part of a network security assessment is vulnerability discovery and penetration testing to identify weaknesses and possible exposures of systems to security threats. Although I have been a TCP/IP networking professional for decades, in the last 10 years I’m also involved in network security as well.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |