Cyber Security / Vulnerability and its types

It is a weakness / loop hole within an organization’s systems / controls / system processes that can be exploited by cybercriminals to gain access to your system for collecting your data/ Harm your system data. It is difficult to create vulnerabilities but vulnerabilities within an organization’s can be used. Vulnerabilities are due to Operating system flaws / network misconfigurations.

Vulnerability Management Steps

Vulnerability Management Steps Details
Identify It is a process of locating the threats and is done by vulnerability scanners. Scanners look for systems mis-configurations, incorrect file system structures and more. The results are checked against security intelligence databases.
Evaluate It evaluates the risk of the threats to your business. Each threat is given a specific risk level.
Address Treats the vulnerability and consists of steps Remediation, Mitigation and Acceptance.

Remediation: It is used to fix / patch vulnerability to eliminate risk.
Mitigation: It means until proper patch is available use the available version.
Acceptance: Take action to address vulnerability b ased on the cost incurred for threat clearance.


Vulnerabilities Types in cyber security

Vulnerability Type Details
System misconfigurations Due to unskilled persons on technologies.
Out of date / unpatched software Has to purchase / Update the softwares.
Missing / weak authorization credentials week login information to gain access to a network
Malicious insider threats Insider threats can be employees
Missing / poor data encryption between communication systems leading to a breach
Zero-day vulnerabilities These are dangerous and known to the attacker but have not yet been identified by an organization.


Home     Back