Week_7_-_Vulnerability_Assessment

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/21

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

22 Terms

1
New cards

Vulnerability Assessment

A proactive security practice to identify and address vulnerabilities to prevent cyberattacks.

2
New cards

Common Vulnerability Scoring System (CVSS)

A risk assessment tool that conveys the attributes and severity of vulnerabilities in software and hardware.

3
New cards

Risk Management

The selection and specification of security controls to manage and reduce risk to an organization.

4
New cards

Network Profiling

The process of understanding and characterizing the normal functioning of a network for security monitoring.

5
New cards

Penetration Testing

Simulated attacks on a network to test the strength of security and identify vulnerabilities.

6
New cards

Anomaly Detection

Techniques used to identify unusual patterns or behaviors in network traffic that may indicate a security breach.

7
New cards

Impact Metrics

Metrics that measure the consequences of a successful exploit based on the CIA triad: confidentiality, integrity, and availability.

8
New cards

Exploitability Metrics

Features of an exploit such as the attack vector, complexity, and user interaction required.

9
New cards

Server Profiling

Establishing the accepted operating state of servers to secure them against vulnerabilities.

10
New cards

Risk Avoidance

Stopping activities that create risk, potentially discontinuing certain operations based on risk assessment.

11
New cards

Malware

Malicious software that can exploit vulnerabilities in networks and devices.

12
New cards

Mobile Device Management (MDM)

Tools and policies used to manage mobile devices, addressing security risks associated with BYOD.

13
New cards

Configuration Management

The process of controlling hardware and software configurations to reduce security risks.

14
New cards

Incident Response

Actions taken to address and manage the consequences of a security breach or cyberattack.

15
New cards

Patch Management

The process of managing software updates to mitigate vulnerabilities in systems and applications.

16
New cards

Network Behavior Analysis (NBA)

Analyzing diverse network data to detect potential security incidents and anomalies.

17
New cards

Risk Sharing

Transferring some of the risk to other parties, such as through outsourcing security operations.

18
New cards

Threat-Vulnerability Pairing

The matching of identified threats with vulnerabilities, serving as a baseline for risk assessment.

19
New cards

CVE Identifiers

Standard names for known cybersecurity vulnerabilities used for research and reference purposes.

20
New cards

Risk Reduction

Taking measures to decrease vulnerabilities and risks in an organization.

21
New cards

Baseline Risk Profile

A reference point established to assess ongoing risks based on criticality and threats.

22
New cards

Big Data Analytics

Techniques used to analyze large sets of data for patterns that may indicate security threats.