A vulnerability scan is an automated process to look for vulnerabilities (or security holes) in a network environment. A network could be internal (LAN) or even external (an website server). The results of a vulnerability scan alert the system administrator of ways a potential hacker could enter or even disrupt a system. It’s a preventive tool. After being able to see the results, it is up to the administrator to be able to understand them and to take appropriate action. Since running a network or a server is a task for advanced users, folks with limited understanding of servers / networks can have a tough time looking at the results.
INFORMATION A VULNERABILITY SCAN PROVIDES
A vulnerability scan for an IP address (or server, since an IP address is in the hands of a server), provides a good amount of info. A great deal of this info is simply useful in terms of knowing how your server operates. It is giving a directory structure of the server (list of directories), kind of server applications operate (Apache, Windows Server, Exchange, etc), SSL info, open and closed ports, various plugins running. If it detects any vulnerabilities, it’ll list them also. Common vulnerabilities include ability to run external server-side uses (Perl, ASP), unprotected vulnerable directories, open ports which usually shouldn’t be open. The actual list of potential vulnerabilities can be quite large and really wouldn’t easily fit in this article.
Approaches To protect AGAINST HACKERS
One) Guard your login info
A typical method hackers access very sensitive information is still using somehow obtaining appropriate login info: username and password in numerous cases. The very best thing you are able to do is guard that information, never ever discuss it with any person, allow it to be difficult to guess and improve it often. Get in place measures to prevent hackers from running password guessing programs. A great way to accomplish that is to lockout an end user after a range of failed attempts.
Two) Don’t keep sensitive data on an external network
By external I mean the individual that’s subjected to the Internet. This dramatically increases the amount of potential intruders. If you’ve any extremely sensitive data, such as credit card numbers, consider not storing them, or perhaps saving them on a harddisk of a personal machine, not really a web server.
Three) Monitor logins
Get software in place to monitor time, IP, user/pass and time of every user that has logged in. Then, in case there is any disruption, it is going to be easier to find the culprit.
Four) Keep backups.
However good your safety is, there’s , obviously , a risk things are able to go wrong. It could possibly be a hacker, or it can simply be hardware crash. blackbox testing , naturally, a good plan to keep recent and readily available backups. For huge networks, the RAID structure works best.