Analyzing Vulnerabilities - CompTIA Security+ SY0-701 - 4.3

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/7

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 5:47 AM on 4/1/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

8 Terms

1
New cards

Dealing with false information

• False positives

• A vulnerability is identified that

doesn't really exist

• This is different than a low-severity vulnerability

• It's real, but it may not be your highest priority

• False negatives

• A vulnerability exists, but you didn't detect it

• Update to the latest signatures

• If you don't know about it, you can't see it

• Work with the vulnerability

detection manufacturer

• They may need to update their signatures

for your environment

2
New cards

Prioritizing Vulnerabilities

• Not every vulnerability shares the same priority

- Some may not be significant

- Others may be critical

• This may be difficult to determine

- The research has probably already been done

• Refer to public disclosures and vulnerability databases

- The industry is well versed

- Online discussion groups, public disclosure mailing lists

3
New cards

CVE

• The vulnerabilities can be cross-referenced online

- Almost all scanners give you a place to go

• National Vulnerability Database: http://nvd.nist.gov/

- Common Vulnerabilities and Exposures (CVE):

- https://cve.mitre.org/cve/

• Microsoft Security Bulletins:

- https://www.microsoft.com/technet/security/

current.aspx

• Some vulnerabilities cannot be definitively identified

- You'll have to check manually to see if a system is

vulnerable

- The scanner gives you a heads-up

4
New cards

Vulnerability classification

• The scanner looks for everything

- Well, not everything - The signatures are the key

• Application scans

- Desktop, mobile apps

• Web application scans

- Software on a web server

• Network scans

- Misconfigured firewalls, open ports, vulnerable

devices

5
New cards

Exposure factor

• Loss of value or business activity if the

vulnerability is exploited

- Usually expressed as a percentage

• A small DDoS may limit access to a service

- 50% exposure factor

• A buffer overflow may completely disable a service

- 100% exposure factor

• A consideration when prioritizing

- Worst possible outcome probably gets priority

6
New cards

Environmental Variables

What environment is associated with this vulnerability?

- Internal server, public cloud, test lab

Prioritization and patching frequency

- A device in an isolated test lab

- A database server in the public cloud

- Which environment get priority?

Every environment is different

- Number and type of users

- Revenue generating application

- Potential for exploit

7
New cards

Industry/organizational impact

Some exploits have significant consequences

- The type of organization is an important consideration

Tallahasee Memorial HealthCare - Feb 2023

- Ransomware - closed for 2 weeks

- Diverted emergency cases, surgeries cancelled

Power utilities - SLC, Utah and LA County, California - March 2019

- DDoS attacks from an unpatched vulnerability

8
New cards

Risk tolerance

The amount of risk acceptable to an organization

- It;s impractical to remove all risk

The timing of security patches

- Patching immediately doesn't allow for proper testing

Testing takes time

- While you're testing, you're also vulnerable

There's a middle ground

- May change based on the severity

Explore top notes

note
historical globalization figures
Updated 1082d ago
0.0(0)
note
~The Phagocytic System~
Updated 536d ago
0.0(0)
note
4.8-4.10 Presentation
Updated 113d ago
0.0(0)
note
States of matter
Updated 1246d ago
0.0(0)
note
Chapter 6: Learning
Updated 1090d ago
0.0(0)
note
GEC1-LESSON 3
Updated 569d ago
0.0(0)
note
historical globalization figures
Updated 1082d ago
0.0(0)
note
~The Phagocytic System~
Updated 536d ago
0.0(0)
note
4.8-4.10 Presentation
Updated 113d ago
0.0(0)
note
States of matter
Updated 1246d ago
0.0(0)
note
Chapter 6: Learning
Updated 1090d ago
0.0(0)
note
GEC1-LESSON 3
Updated 569d ago
0.0(0)

Explore top flashcards

flashcards
Wat een taal zeg
91
Updated 1221d ago
0.0(0)
flashcards
Sp4 Un1A (23-24) | El arte
30
Updated 952d ago
0.0(0)
flashcards
Linear Algebra Final Review
47
Updated 471d ago
0.0(0)
flashcards
Odyssey Terms
35
Updated 1240d ago
0.0(0)
flashcards
is 117 final quiz review
44
Updated 1204d ago
0.0(0)
flashcards
Passe Compose
54
Updated 1147d ago
0.0(0)
flashcards
Wat een taal zeg
91
Updated 1221d ago
0.0(0)
flashcards
Sp4 Un1A (23-24) | El arte
30
Updated 952d ago
0.0(0)
flashcards
Linear Algebra Final Review
47
Updated 471d ago
0.0(0)
flashcards
Odyssey Terms
35
Updated 1240d ago
0.0(0)
flashcards
is 117 final quiz review
44
Updated 1204d ago
0.0(0)
flashcards
Passe Compose
54
Updated 1147d ago
0.0(0)