• Common Vulnerability Scoring System

    Software, hardware and firmware vulnerabilities pose a critical risk to any organization operating a computer network and can be difficult to categorize and mitigate. The Common Vulnerability Scoring System (CVSS) provides a way to capture the principal characteristics of a vulnerability, and produce a numerical score reflecting its severity, as well as a textual representation […]
    • by Yatin Jog
    • 9 Months ago
    • 0
  • Classification of Vulnerabilities in Cybersecurity

    Information security professionals need to be aware of the processes involved in identifying system vulnerabilities. It is important to devise suitable countermeasures, in a cost-effective and efficient way, to reduce the risk factor associated with the identified vulnerabilities.   Vulnerabilities can be classified into the following types:   Access Control Vulnerabilities It is an error […]
    • by Yatin Jog
    • 9 Months ago
    • 1
  • Vulnerability Assessment Tools – Which are not VA tools?

    Various types of automated, semi-automated, and manual process-assistive tools exist that can be used to find and analyze vulnerabilities in information systems and networks. In this blog the system and network elements assessed by a tool will be referred to as the targets of that tool. Before discussing the VA tools, one needs to understand, […]
    • by Yatin Jog
    • 9 Months ago
    • 0
  • Vulnerability Assessment and Penetration Testing (VAPT)

    Vulnerability¬†analysis, also known as¬†vulnerability assessment, is a process that defines, identifies, and classifies the security holes (vulnerabilities) in a computer, network, or communications infrastructure.   Vulnerability Assessment and Penetration Testing (VAPT) provides enterprises with a more comprehensive application evaluation than any single test alone. Using the Vulnerability Assessment and Penetration Testing (VAPT) approach gives an […]
    • by Yatin Jog
    • 9 Months ago
    • 0