What is a Vulnerability?

Threat Management

A vulnerability, in information technology (IT), is a flaw in code or design that creates a potential point of security compromise for an endpoint or network. (TechTarget). This can lead to unauthorized access to data, compromise the integrity by changing the data (web page defacement) or deny access to data (Denial of Service).

Some common causes of cyber security vulnerabilities:

  • Unpatched or out of date software
  • Improper configuration
  • Missing or weak credentials
  • Poor system configurations
  • Insider threats
  • Zero-day vulnerabilities
  • Lack of encryption
  • Account permissions

To recognize the vulnerabilities present in your infrastructure it is necessary to perform a vulnerability scan and asset audit. Understanding what assets exist on your network is the first step to discovering the possible liabilities that exist. Identify and analyze to address flaws in hardware and software. Then apply mitigation and patching strategies to protect against potential attacks using these deficiencies.

Once a risk has been identified there needs to be a determination of how to address it. Options include:

Remediation: Completely fixing or patching.
Mitigation: This would be taking an action to avoid the exploitation of the vulnerability until a more permanent solution can be implemented.
Acceptance: Realizing that the cost of remediation is more costly than the risk itself or the risk occurrence is minimal may result in non-resolution.

Setting a series of controls in place will assist with mitigating potential weaknesses. And don’t forget the human element. Training and education to build best practices and etiquette online is equally important. Patching and proper configurations will strengthen and protect your assets. Recognizing vulnerabilities is crucial to managing your risks.