The Open Source Vulnerability analysis tool can help open, comprehensive review of cloud security. Vulnerability analysis is only part of ensuring server security. Clearly, it is a big step in the right direction to precisely define a vulnerability assessment policy.
1. Introduction
Vulnerability assessment is an important aspect of any security policy. Now, attacks on Internet hosts are increasingly driven by interest, so they are more cunning and more widely distributed.
It seems difficult to protect all the Web servers, but most of the attacks that hackers initiate can be avoided.
Server configuration does not meet the requirements or the tools used are not updated, easy to cause a large number of Internet servers are vulnerable. Because hackers are easy to find and exploit server vulnerabilities. It is not difficult to make sure that the server is up to date and there are no configuration errors, but these tasks are ignored due to time constraints.
Vulnerability assessments can help identify errors in the server's security configuration and help to uncover software vulnerabilities that require patches to be installed.
By leveraging remote vulnerability assessments in the cloud, you can help your organization achieve scale benefits. Because configuration and management assessment tools do not require expertise, you can also assess your organization's vulnerabilities.
2. The increasingly serious threat situation
The simplicity of attack automation and access exploits is the main reason why servers are increasingly threatened. In fact, if you want to prove how easy it is, you can access http://www.milw0rm.com, select a recent Web application vulnerability, and then enter "Googledork" in Google--such as "Poweredby Tname", In five minutes, see how many vulnerabilities you can find on all the servers on your Web page.
3. Common carrier of loophole existence
3.1 Improperly configured servers
Messy file permissions, improperly configured Web or email servers, or when the time is ticking and you're stuck in a temporary patch update--improperly configured servers are everywhere, and often because time constraints aren't too much to consider, making it even a system administrator.
3.2 Software has not been updated
server operating systems and applications need to be updated, which is not optional. With Windows Updates, yum, and apt tools, you can help update reduce a large number of host vulnerabilities, but many hosts will still be ignored. This is only a matter of time when a faulty service is discovered and the system suffers.
3.3 Web Script
PHP and ASP applications and scripts are an effective way to implement Web page dynamics, but when there are security updates available, such as operating systems and software must be guaranteed to be updated. A good example of this is WordPress blog software, we chose WordPress not because it is particularly unsafe, but because it represents a widely popular script--once exposed some dangerous security vulnerabilities in the past. These scripts need to be constantly updated because they are easy to ignore-until your blog is attacked and you embed a malicious page to attack your browsing user.
3.4 Password Not safe enough
Surfing on the Internet is essential to use strong passwords, viewing the host and internet records is a very simple thing, it is also easy to find how long the system will probably be brute force attack once. Brute force attacks can jeopardize many service items, including Ssh,rdp,ftp,web forms and VNC.
3.5 Password Reuse
It is unrealistic to use a different password for each login, but it is unwise to use the same password everywhere. The survey found that server users would always use the same password on the Web page host system on a poorly configured online forum, and that the same password would be used on the web.
4. Illegal use of servers
4.1 Spam
Criminals use servers to send thousands of spam messages, which are profitable for them. Only when you block or blacklist them will they stop sending spam, but they may find another way to exploit the server.
4.2 Widely distributed malware
Using a Web server to provide Web content services-just the content itself, what if there is malware in the Web page? Enter your customer or user system, and spread malware such as keyboard records, and eventually empty the user's bank account funds.
4.3 Phishing Websites
We've seen a lot of emails posing as PayPal or bank pages, and if these fake pages come from your web host, the problem will be serious.
4.4 Warez File Storage
Pirated software, movies, or other valuable replicas can be stored and delivered online via your server.
5. System security
• Each attack will delay the normal operation of the server, if you are running an online business, this price will be higher.
• It takes a lot of time to solve problems, form emergency response mechanisms and solve problems quickly.
• The compromised system should rebuild a clean backup data, which is a small task in itself.
• Your reputation will be lost and you will lose your existing customers.
6. Cloud Security
The technology management of security scanning tools is included in the cloud, constantly updating security tools and optimizing scans, and should be carried out by technical experts rather than general information technicians
Cloud Security provides:
Non-intrusive scan network and host perimeter
Simulate network attacks against your network environment
Systems and policies for testing intrusion detection and incident response
Provides an additional layer of protection for security. Security is an ongoing process that requires various levels of protection
To facilitate further investigation, send you a detailed technical report via email
Technical Security Intelligence support staff, consultant follow-up add to improve
Help you lighten your workload and concentrate on doing your business
Economic initiatives to ensure server security