|
Vulnerability Management Steps | Details |
Identify | It is a process of locating the threats and is done by vulnerability scanners. Scanners look for systems mis-configurations, incorrect file system structures and more. The results are checked against security intelligence databases. |
Evaluate | It evaluates the risk of the threats to your business. Each threat is given a specific risk level. |
Address |
Treats the vulnerability and consists of steps Remediation, Mitigation and
Acceptance.
Remediation: It is used to fix / patch vulnerability to eliminate risk. Mitigation: It means until proper patch is available use the available version. Acceptance: Take action to address vulnerability b ased on the cost incurred for threat clearance. |
Vulnerabilities Types in cyber security
Vulnerability Type | Details |
System misconfigurations | Due to unskilled persons on technologies. |
Out of date / unpatched software | Has to purchase / Update the softwares. |
Missing / weak authorization credentials | week login information to gain access to a network |
Malicious insider threats | Insider threats can be employees |
Missing / poor data encryption | between communication systems leading to a breach |
Zero-day vulnerabilities | These are dangerous and known to the attacker but have not yet been identified by an organization. |
Home Back