• Home
  • Cryptography
  • Cyber Security Fundamentals
  • Cyber Threat Intelligence
  • Incident Response and Computer Network Forensics
  • Management and Cyber Security
  • Network Visualization and Vulnerability Detection
  • Operational Policy
  • Reference Link Library
  • Risk Management
  • Secure Software Design and Development
  • Security Architecture
  Keith E. Anderson, Sr.

Network visualization and vulnerability detection

The primary ethical drivers for securing enterprise networks, as well as infrastructures at all levels, are to secure data and safeguard systems that can negatively affect people if a failure of controls were to lead to an impact on confidentiality, integrity, and/or availability of necessary resources. As professionals, there are two necessities we need in order to ensure we're effectively protecting assets and reducing risk to a level acceptable at an organizational level:

  • Network Visibility
  • Vulnerability Detection

Network visibility allows us to capture, inspect, and assess what traffic is traversing our infrastructure, and with the knowledge of what normal looks like, contribute in the efforts of event correlation when anomalous traffic patterns are detected.

Vulnerability detection allows for the detection of weaknesses in systems that could be, potentially, exploited and lead to unauthorized access to systems and/or data.
Picture
Eukhost (2014). Orange hacked 1.3 million customers data stolen
Reflection
Metasploit
Working with Kismet
Scanning for Vulnerabilities
Creating a Vulnerability Management Strategy
Nework Monitoring vs. Network Security Monitoring
Forescout eyeSight (You Can’t Secure What You Can’t See™)
Powered by Create your own unique website with customizable templates.
  • Home
  • Cryptography
  • Cyber Security Fundamentals
  • Cyber Threat Intelligence
  • Incident Response and Computer Network Forensics
  • Management and Cyber Security
  • Network Visualization and Vulnerability Detection
  • Operational Policy
  • Reference Link Library
  • Risk Management
  • Secure Software Design and Development
  • Security Architecture