|
| Vulnerability Management Steps | Details |
| Identify | It is a process of locating the threats and is done by vulnerability scanners. Scanners look for systems mis-configurations, incorrect file system structures and more. The results are checked against security intelligence databases. |
| Evaluate | It evaluates the risk of the threats to your business. Each threat is given a specific risk level. |
| Address |
Treats the vulnerability and consists of steps Remediation, Mitigation and
Acceptance.
Remediation: It is used to fix / patch vulnerability to eliminate risk. Mitigation: It means until proper patch is available use the available version. Acceptance: Take action to address vulnerability b ased on the cost incurred for threat clearance. |
Vulnerabilities Types in cyber security
| Vulnerability Type | Details |
| System misconfigurations | Due to unskilled persons on technologies. |
| Out of date / unpatched software | Has to purchase / Update the softwares. |
| Missing / weak authorization credentials | week login information to gain access to a network |
| Malicious insider threats | Insider threats can be employees |
| Missing / poor data encryption | between communication systems leading to a breach |
| Zero-day vulnerabilities | These are dangerous and known to the attacker but have not yet been identified by an organization. |
Home Back