Vulnerability Assessment and Penetration Testing Comparison

Jignesh C Doshi
Bhushan Trivedi

Don't use plagiarized sources. Get Your Custom Essay on
Vulnerability Assessment and Penetration Testing Comparison
Just from $13/Page
Order Essay

ABSTRACT
Business using internet has grown drastically in past decade. Attacks on web application have increased. Web application security is a big challenge for any organizations as result of increasing attacks. There exists different approaches to mitigate various security risks are defensive coding, hardening (Firewall), Monitoring and auditing. This solutions found more towards prevention of attacks or of monitoring types of. Vulnerability assessment and Penetration testing are two approaches widely used by organizations to assess web application security. Both solutions are different and complimentary to each other. In this paper comparison of these two approaches are provided. Authors found that penetration testing is better compare to vulnerability assessment as it exploits vulnerability, while vulnerability assessment is superior in terms of coverage over penetration testing.
General Terms
Vulnerability Measurement, Penetration Testing
Keywords
Attack, Vulnerability, Security Risk, VAPT,
1. INTRODUCTION
Web application usage has increased as more and more services are available on web. Business using Web applications is also increasing day by day. On other side, web application based attacks have increased. Web application have become main target of attackers. Major impact of attacks is data loss or financial loss or reputation loss.
Various types of countermeasures exists to protect system against attacks like defensive coding, firewall, Intrusion detection system etc. [15]. The solution exists in two categories: proactive and reactive. To secure web applications, thorough study of vulnerabilities is required. Study will help in taking effective actions. Vulnerability measurement and Penetration testing are widely used approaches by organizations for web application security assessment.
In this paper, authors have compared vulnerability assessment and penetration testing.
The rest of the paper is organized as follows. Vulnerability assessment is discussed in section 2, Penetration testing is discussed in Section 3. Section 4 describes comparison between vulnerability assessment and penetration testing. Conclusion is described in section 5.
2. Current Web Application Security Trends
The number of internet users and websites are increasing rapidly in recent years [9]. Approximately 66% of web applications have problem as per Gartner. According to sophisticated vulnerability assessment tools 60% vulnerabilities can be found in most of web applications [12].
Security measures most commonly applied for web application security are firewalls, Intrusion Detection System (IDS), Anti-virus System and defensive coding [14][15]. This solution either requires developer skills or efforts in common [15]. These solutions provide a way to assess system, while organizations need a way to assess security countermeasure assessment. It is also necessary to assess web application periodically against security risks in order to take effective actions.
3. Vulnerability Assessment
Vulnerability is a weakness or flaw in a system. Reasons for vulnerability existence are weak password, coding, input validation, misconfiguration etc. Attacker tries to discover vulnerability and then exploit it.
Vulnerability assessment is a proactive and systematic strategy to discover vulnerability. It is used to discover unknown problems in the system. It is also required by industry standard like DSS PCI from compliance point of view.
Vulnerability assessment is achieved using scanners. It is a hybrid solution, which combines automated testing with expert analysis.
Figure 1: Vulnerability Assessment Process

Vulnerability assessment is a one step process ( Refer to figure 1). We will learn more details about vulnerability assessment in section 5.
4. Penetration Testing
A penetration testing evaluates the security of a computer system or network by simulating an attack. It is a proactive and systematic approach for security assessment.
Figure 1: Penetration Testing Process

Penetration testing is a two steps process (refer to figure 2). We will learn more details about penetration in next section.
5. Comparison
5.1 Generic

 

Vulnerability
Assessment

Penetration Testing

Working

Discover vulnerabilities

Discover and exploit vulnerabilities

Alerts pre-existing flaws found in code

Shows how damaging flaws pose a threat to application

Do not differentiate between flaws that can cause damage or not

Gives detail picture of flaws found in application with risk associated with it

Mechanism

Discovery & Scanning

Simulation

Process

One step :
Find vulnerability

Two step process: Find and exploit vulnerability

Focus

Breadth over depth

Depth over breadth

Type

Hybrid solution

One solution for multiple vulnerabilities testing

Coverage of completeness

High

Low

Defend ability

Medium

High

Control

Detective control, used to detect when equipment is compromised.

Preventative control used to reduce exposures

Cost

Low to moderate

High

Performed by

In house staff

Attacker, Pen tester

 
5.2 Resource Requirements

 

Vulnerability Measurement

Penetration Testing

Internal Resource Requirement

Medium

Low

External Resource Requirement

High

High

Tester Knowledge

High

Low

 
5.3 Testing

 

Vulnerability Measurement

Penetration Testing

Testing of other security Investments

Not possible

Determine whether other security investments are functioning properly or not

Security Risk Assessment

Not possible

Provide security risk assessment as mimics attacks just like attacker

Testing

Does not simulate attacks

Simulates real world attacks

How often to run

Continuously, especially after new equipment is loaded

Periodically

5.4 Results

 

Vulnerability Assessment

Penetration Testing

Reports

Comprehensive baseline of what vulnerabilities exist and changes from the last report

Short and to the point, identifies what data was actually compromised

Metrics

Lists known software vulnerabilities that may be exploited

Discovers unknown and exploitable exposures to normal business processes

Results

Provides partial evaluation of vulnerabilities

Provides complete evaluation of vulnerabilities

 
5.5 Limitations
Major limitations of Vulnerability Assessments are:
ï‚· Cannot identify potential access path
ï‚· Provides false positive
ï‚· Requires high technical skills for tester
ï‚· Hybrid solution
ï‚· Cannot exploit flaws
Major limitations of Penetration testing are:
ï‚· Identifies potential access paths
ï‚· Identifies only those which poses threats
ï‚· May not identify obvious vulnerability
ï‚· Cannot provide information about new vulnerabilities
ï‚· Cannot identify server side vulnerabilities
6. Conclusion
With the exception of coverage, penetration testing is superior to vulnerability management.
Key benefits of penetration testing over vulnerability assessment are:

Technical capability required in penetration testing is low compare to vulnerability assessment
Can be used runtime
With penetration testing we can detect, confirm and exploit vulnerability.
With penetration testing can determine the resulting impact on the organisation.

For effective security, it is important to understand vulnerability in details.
Both are complimentary strategies to each other and proactive. We suggest to use both together.
7. REFERENCES

Vulnerability Assessment and Penetration Testing: http://www.veracode.com/ security/vulnerability-assessment-and-penetration-testing
John Barchie, Triware Net world Systems, Penetration Testing vs. Vulnerability Scanning: http://www.tns.com/PenTestvsVScan.asp
Penetration Testing Limits http:// www.praetorian.com/blog/penetration-testing-limits
Vulnerability Analysis, http://www.pentest-standard.org/index.php/ Vulnerability Analysis
Open Web Application Security Project, https://www.owasp.org/index.php/Category: Vulnerability
Penetration Testing: http://searchsoftwarequality .techtarget.com/definition/penetration-testing
Vulnerability Assessment and Penetration Testing: http://www.aretecon.com/aretesoftwares
Ankita Gupta, Kavita, Kirandeep Kaur: Vulnerability Assessment and Penetration Testing,
International Journal of Engineering Trends and Technology- Volume4 Issue3- 2013, ISSN: 2231-5381 Page 328-330
Konstantinos Xynos, Iain Sutherland, Huw Read, Emlyn Everitt and Andrew J.C. Blyth: PENETRATION TESTING AND VULNERABILITY ASSESSMENTS: A PROFESSIONAL APPROACH, Originally published in the Proceedings of the 1st International Cyber Resilience Conference, Edith Cowan University, Perth Western Australia, 23rd August 2010 available at : http://ro.ecu.edu.au/icr/16
You Yu, Yuanyuan Yang, Jian Gu, and Liang Shen, Analysis and Suggestions for the Security of Web Applications,, International Conference on Computer Science and Network Technology, 2011, 978-1-4577-1587-7/111, IEEE
Andrey Petukhov, Dmitry Kozlov, Detecting Security Vulnerabilities in Web Applications Using Dynamic Analysis with Penetration Testing, https://www.owasp.org/images/3/3e/OWASP-AppSecEU08-Petukhov.pdf accessed on 31st January 2015
Parvin Ami, Ashikali Hasan: Seven Phrase Penetration Testing Model,International Journal of Computer Applications (0975 – 8887),Volume 59– No.5, December 2012
Aileen G. Bacudio, Xiaohong Yuan, Bei-Tseng Bill Chu, Monique Jones,an overview of penetration testing, International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.6, November 2011 DOI :10.5121/ijnsa.2011.3602
Jignesh Doshi, Bhushan Trivedi, Assessment of SQL Injection Solution Approaches, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 4, Issue 10, October 2014 ISSN: 2277 128X

1
 

What Will You Get?

We provide professional writing services to help you score straight A’s by submitting custom written assignments that mirror your guidelines.

Premium Quality

Get result-oriented writing and never worry about grades anymore. We follow the highest quality standards to make sure that you get perfect assignments.

Experienced Writers

Our writers have experience in dealing with papers of every educational level. You can surely rely on the expertise of our qualified professionals.

On-Time Delivery

Your deadline is our threshold for success and we take it very seriously. We make sure you receive your papers before your predefined time.

24/7 Customer Support

Someone from our customer support team is always here to respond to your questions. So, hit us up if you have got any ambiguity or concern.

Complete Confidentiality

Sit back and relax while we help you out with writing your papers. We have an ultimate policy for keeping your personal and order-related details a secret.

Authentic Sources

We assure you that your document will be thoroughly checked for plagiarism and grammatical errors as we use highly authentic and licit sources.

Moneyback Guarantee

Still reluctant about placing an order? Our 100% Moneyback Guarantee backs you up on rare occasions where you aren’t satisfied with the writing.

Order Tracking

You don’t have to wait for an update for hours; you can track the progress of your order any time you want. We share the status after each step.

image

Areas of Expertise

Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.

Areas of Expertise

Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.

image

Trusted Partner of 9650+ Students for Writing

From brainstorming your paper's outline to perfecting its grammar, we perform every step carefully to make your paper worthy of A grade.

Preferred Writer

Hire your preferred writer anytime. Simply specify if you want your preferred expert to write your paper and we’ll make that happen.

Grammar Check Report

Get an elaborate and authentic grammar check report with your work to have the grammar goodness sealed in your document.

One Page Summary

You can purchase this feature if you want our writers to sum up your paper in the form of a concise and well-articulated summary.

Plagiarism Report

You don’t have to worry about plagiarism anymore. Get a plagiarism report to certify the uniqueness of your work.

Free Features $66FREE

  • Most Qualified Writer $10FREE
  • Plagiarism Scan Report $10FREE
  • Unlimited Revisions $08FREE
  • Paper Formatting $05FREE
  • Cover Page $05FREE
  • Referencing & Bibliography $10FREE
  • Dedicated User Area $08FREE
  • 24/7 Order Tracking $05FREE
  • Periodic Email Alerts $05FREE
image

Our Services

Join us for the best experience while seeking writing assistance in your college life. A good grade is all you need to boost up your academic excellence and we are all about it.

  • On-time Delivery
  • 24/7 Order Tracking
  • Access to Authentic Sources
Academic Writing

We create perfect papers according to the guidelines.

Professional Editing

We seamlessly edit out errors from your papers.

Thorough Proofreading

We thoroughly read your final draft to identify errors.

image

Delegate Your Challenging Writing Tasks to Experienced Professionals

Work with ultimate peace of mind because we ensure that your academic work is our responsibility and your grades are a top concern for us!

Check Out Our Sample Work

Dedication. Quality. Commitment. Punctuality

Categories
All samples
Essay (any type)
Essay (any type)
The Value of a Nursing Degree
Undergrad. (yrs 3-4)
Nursing
2
View this sample

It May Not Be Much, but It’s Honest Work!

Here is what we have achieved so far. These numbers are evidence that we go the extra mile to make your college journey successful.

0+

Happy Clients

0+

Words Written This Week

0+

Ongoing Orders

0%

Customer Satisfaction Rate
image

Process as Fine as Brewed Coffee

We have the most intuitive and minimalistic process so that you can easily place an order. Just follow a few steps to unlock success.

See How We Helped 9000+ Students Achieve Success

image

We Analyze Your Problem and Offer Customized Writing

We understand your guidelines first before delivering any writing service. You can discuss your writing needs and we will have them evaluated by our dedicated team.

  • Clear elicitation of your requirements.
  • Customized writing as per your needs.

We Mirror Your Guidelines to Deliver Quality Services

We write your papers in a standardized way. We complete your work in such a way that it turns out to be a perfect description of your guidelines.

  • Proactive analysis of your writing.
  • Active communication to understand requirements.
image
image

We Handle Your Writing Tasks to Ensure Excellent Grades

We promise you excellent grades and academic excellence that you always longed for. Our writers stay in touch with you via email.

  • Thorough research and analysis for every order.
  • Deliverance of reliable writing service to improve your grades.
Place an Order Start Chat Now
image

Order your essay today and save 30% with the discount code Happy