paint-brush
Network Vulnerabilities: How to Identify Them and Assign Risk Ratingsby@gtmars
422 reads
422 reads

Network Vulnerabilities: How to Identify Them and Assign Risk Ratings

by Vic5mOctober 9th, 2020
Read on Terminal Reader
Read this story w/o Javascript
tldt arrow

Too Long; Didn't Read

A vulnerability is a weakness in the system, a threat actor can exploit the weakness, to perform unauthorized actions within organizational applications or network. Vulnerability management is the cyclical practice of identifying, classifying, remediating, and mitigating vulnerabilities. Using vulnerability with the identical meaning of risk can result in confusion. The danger is the potential of a major impact as a result of exploiting a vulnerability. We discover vulnerabilities with a vulnerability scanner, which analyzes a system in search of known vulnerabilities, like open/insecure ports, software miss configurations and susceptibility to malware infections.
featured image - Network Vulnerabilities: How to Identify Them and Assign Risk Ratings
 Vic HackerNoon profile picture
 Vic

Vic

@gtmars

Sharing knowledge in the digital world about Cybersecurity.

About @gtmars
LEARN MORE ABOUT @GTMARS'S
EXPERTISE AND PLACE ON THE INTERNET.
L O A D I N G
. . . comments & more!

About Author

 Vic HackerNoon profile picture
Vic@gtmars
Sharing knowledge in the digital world about Cybersecurity.

TOPICS

THIS ARTICLE WAS FEATURED IN...

Permanent on Arweave
Read on Terminal Reader
Read this story in a terminal
 Terminal
Read this story w/o Javascript
Read this story w/o Javascript
 Lite
Gmx
Essentials
Learnrepo