Network Vulnerabilities: How to Identify Them and Assign Risk Ratingsby@gtmars
418 reads

Network Vulnerabilities: How to Identify Them and Assign Risk Ratings

tldt arrow
Read on Terminal Reader
Read this story w/o Javascript

Too Long; Didn't Read

A vulnerability is a weakness in the system, a threat actor can exploit the weakness, to perform unauthorized actions within organizational applications or network. Vulnerability management is the cyclical practice of identifying, classifying, remediating, and mitigating vulnerabilities. Using vulnerability with the identical meaning of risk can result in confusion. The danger is the potential of a major impact as a result of exploiting a vulnerability. We discover vulnerabilities with a vulnerability scanner, which analyzes a system in search of known vulnerabilities, like open/insecure ports, software miss configurations and susceptibility to malware infections.
featured image - Network Vulnerabilities: How to Identify Them and Assign Risk Ratings
 Vic HackerNoon profile picture

@gtmars

Vic

Sharing knowledge in the digital world about Cybersecurity.


Receive Stories from @gtmars

react to story with heart
 Vic HackerNoon profile picture
by Vic @gtmars. Sharing knowledge in the digital world about Cybersecurity.

RELATED STORIES

L O A D I N G
. . . comments & more!