-
Notifications
You must be signed in to change notification settings - Fork 2
Expand file tree
/
Copy pathabout.html
More file actions
116 lines (85 loc) · 5.41 KB
/
about.html
File metadata and controls
116 lines (85 loc) · 5.41 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
<!DOCTYPE html>
<html lang="en">
<head>
<meta charset="utf-8">
<meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no">
<title>V-Shark Dashboard</title>
<meta content="" name="description">
<meta content="" name="keywords">
<!-- Favicons -->
<link href="assets/img/favicon.png" rel="icon">
<link href="assets/img/apple-touch-icon.png" rel="apple-touch-icon">
<!-- Google Fonts -->
<link rel="preconnect" href="https://fonts.googleapis.com">
<link rel="preconnect" href="https://fonts.gstatic.com" crossorigin>
<link href="https://fonts.googleapis.com/css2?family=Open+Sans&family=Poppins:wght@100;200;400;500;600;700&family=Space+Mono:wght@400;700&display=swap" rel="stylesheet">
<!-- Vendor CSS Files -->
<link href="assets/vendor/bootstrap/css/bootstrap.min.css" rel="stylesheet">
<link href="assets/vendor/bootstrap-icons/bootstrap-icons.css" rel="stylesheet">
<!-- Template Main CSS File -->
<link href="assets/css/style.css" rel="stylesheet">
</head>
<body>
<!-- ======= Header ======= -->
<header id="header" class="header fixed-top d-flex align-items-center">
<div class="d-flex align-items-center justify-content-between">
<a href="index.html" class="logo d-flex align-items-center">
<img src="assets/img/logo.png" alt="">
<span class="d-none d-lg-block">V-Shark</span>
</a>
</div>
<nav class="header-nav ms-auto">
<a class="nav-link collapsed" data-bs-target="#forms-nav" data-bs-toggle="collapse" href="#" style="color:#cfe0ff;">
<i class="bi bi-box-arrow-right"></i>
<span>Sign Out</span>
</a>
</nav>
</header>
<!-- End Header -->
<!-- =========//// Main Canvas ////========== -->
<main id="main" class="main">
<div class="pagetitle">
<h1>ABout Us</h1>
</div><!-- End Page Title -->
<h5 class="">Benefits</h5>
<p class="section-flag">V-shark is a remote monitoring and vulnerability assessment tool that can be used to monitor the remote systems with the help of a very small Window Utility. It can monitor the system for all the threats and vulnerabilities that might work like a backdoor for trojans, malwares and for hackers to sneak into your system and corrupt your data.
This tool will actively keep monitoring your system for open ports, firewall status, AV Status, Open Applications etc. and will update the admin with the help of a centralised dashboard which the admin can take an action on.
** What is Vulnerability Assessment ** Vulnerability scanning or vulnerability assessment is a systematic process of finding security loopholes in any system addressing the potential vulnerabilities.
The purpose of vulnerability assessments is to prevent the possibility of unauthorized access to systems. Vulnerability testing preserves the confidentiality, integrity, and availability of the system. The system refers to any computers, networks, network devices, software, web application, cloud computing, etc.</p>
<h5 >Types of Vulnerability Scanners</h5>
<p class="section-flag">Vulnerability scanners have their ways of doing jobs. We can classify the vulnerability scanners into four types based on how they operate.</p>
<h5 >Cloud-Based Vulnerability Scanners</h5>
<p class="section-flag">Used to find vulnerabilities within cloud-based systems such as web applications, WordPress, and Joomla.
</p>
<h5 >Host-Based Vulnerability Scanners
</h5>
<p class="section-flag">Used to find vulnerabilities on a single host or system such as an individual computer or a network device like a switch or core-router.</p>
<h5 >Network-Based Vulnerability Scanners</h5>
<p class="section-flag">Used to find vulnerabilities in an internal network by scanning for open ports. Services running on open ports determined whether vulnerabilities exist or not with the help of the tool.</p>
<h5 >atabase-Based Vulnerability Scanners</h5>
<p class="section-flag">Used to find vulnerabilities in database management systems. Databases are the backbone of any system storing sensitive information. Vulnerability scanning is performed on database systems to prevent attacks like SQL Injection.</p>
<h2>Advantages of Scanning for Vulnerabilities</h2>
<p class="section-flag">Vulnerability scanning keeps systems secure from external threats. Other benefits include:
Affordable – Many vulnerability scanners are available free of charge.
Quick – Assessment takes a few hours to complete.
Automate – can use automated functions available in the vulnerability tools to perform scans regularly without manual involvement.
Performance – vulnerability scanners perform almost all the well-known vulnerability scan.
Cost/Benefit – reduce cost and increase benefits by optimizing security threats.
</p>
</main><!-- End #main -->
<!-- ======= Footer ======= -->
<footer id="footer" class="footer">
<div class="copyright">
© 2022 Copyright <strong><span>V Shark</span></strong> | Developed by Team JSA
</div>
<div class="credits">
</div>
</footer><!-- End Footer -->
<a href="#" class="back-to-top d-flex align-items-center justify-content-center"><i class="bi bi-arrow-up-short"></i></a>
<!-- Vendor JS Files -->
<script src="assets/vendor/bootstrap/js/bootstrap.bundle.min.js"></script>
<!-- Template Main JS File -->
<script src="assets/js/main.js"></script>
<script src="https://code.jquery.com/jquery-3.5.1.js"></script>
</body>
</html>