08. Analyze Vulnerabilities and Threats
Analyze Vulnerabilities and Threats
ND545 C1 L5 07 Analyze Vulnerabilities And Threats Video
Analyze Vulnerabilities and Threats
In this lesson, we’ll look at three primary areas within a Windows Operating System that may contain vulnerabilities:
- Shared folders and files - Folders and files are often shared by users to make it easier for others to view or modify them.
The threat is that you don’t always know who may be able to see or change their content. Ransomware is another threat that will often try to lock file shares on a network until the ransom is paid. It’s good to know what files and folders are shared on both a PC and across a network
- Windows Services - These are executable applications that often run continuously in the background. They can be automatically started when a computer starts. Trigger events can also start services, like when you run a particular application. Services running that aren’t needed can bog down a computer.
A potential security threat is that running services can allow unauthorized access to the computer or its contents.
- Windows and Application Updates
Malicious software is a continual threat to unpatched systems and applications. Other threats include unauthorized access to the system or data or the disclosure of sensitive data.
Further research
- Common Vulnerabilities and Enumeration (CVE) - https://cve.mitre.org/
- Microsoft Security Resource Center (MSCR), Security Update Guide - https://portal.msrc.microsoft.com/en-us/security-guidance