Page 1082 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1082

for operating systems, applications, and devices.

                    Extensible Configuration Checklist Description Format (XCCDF)
                    provides a language for specifying security checklists.


                    Open Vulnerability and Assessment Language (OVAL) provides a
                    language for describing security testing procedures.


               Vulnerability Scans

               Vulnerability scans automatically probe systems, applications, and
               networks, looking for weaknesses that may be exploited by an attacker.

               The scanning tools used in these tests provide quick, point-and-click
               tests that perform otherwise tedious tasks without requiring manual
               intervention. Most tools allow scheduled scanning on a recurring basis
               and provide reports that show differences between scans performed
               on different days, offering administrators a view into changes in their
               security risk environment.


               There are four main categories of vulnerability scans: network
               discovery scans, network vulnerability scans, web application
               vulnerability scans, and database vulnerability scans. A wide variety of
               tools perform each of these types of scans.




                             Remember that information security professionals aren’t
                  the only ones with access to vulnerability testing tools. Attackers

                  have access to the same tools used by the “good guys” and often
                  run vulnerability tests against systems, applications, and networks
                  prior to an intrusion attempt. These scans help attackers zero in on
                  vulnerable systems and focus their attacks on systems where they
                  will have the greatest likelihood of success.




               Network Discovery Scanning

               Network discovery scanning uses a variety of techniques to scan a
               range of IP addresses, searching for systems with open network ports.
               Network discovery scanners do not actually probe systems for

               vulnerabilities but provide a report showing the systems detected on a
   1077   1078   1079   1080   1081   1082   1083   1084   1085   1086   1087