![]() Generally speaking, a vulnerability scanner will scan and compare your environment against a vulnerability database, or a list of known vulnerabilities the more information the scanner has, the more accurate its performance. This central listing of CVEs serves as a reference point for vulnerability scanners. Once a bug is determined to be a vulnerability, it is registered by MITRE as a CVE, or common vulnerability or exposure, and assigned a Common Vulnerability Scoring System (CVSS) score to reflect the potential risk it could introduce to your organization. ![]() Vulnerabilities can be leveraged to force software to act in ways it’s not intended to, such as gleaning information about the current security defenses in place. While bugs aren’t inherently harmful (except to the potential performance of the technology), many can be taken advantage of by nefarious actors-these are known as vulnerabilities. ![]() What’s left behind from these mistakes is commonly referred to as a bug. Mistakes happen, even in the process of building and coding technology. ![]()
0 Comments
|
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
March 2023
Categories |