In this video, Lora Vaughn McIntosh shares some of the main causes of vulnerabilities. Learn the most common attack vectors as Lora shares a few real-world examples.
- [Instructor] Have you ever built something…and presented it to your friends only…to have one of them point out a flaw…or something you just totally overlooked?…Security vulnerabilities are kind of like that.…A system was built or set up with flaws or bugs in it,…and those flaws can lead to security issues.…Back in the days when the internet didn't exist,…and computers, if they had to communicate across networks,…did so on networks that were closed to outsiders.…Security just wasn't a big concern.…At that point in time, a flaw or bug that might be used…to compromise the system or its data just wasn't…as big of a deal as it is today.…
Back then, in order to even try to take advantage…of vulnerabilities, you had to figure how to get access…to something that was probably…behind a locked door or several.…Obviously, things have changed now that everything,…even refrigerators and washing machines,…communicates over the internet.…Even though there are frequently barriers…to protect networks from each other, the systems still have…
- What's a vulnerability and why do they exist?
- Main sources for vulnerability data
- Prioritizing vulnerabilities
- The industry standard for vulnerability risk scoring
- How regulations can impact vulnerability management processes
- How compensating controls affect vulnerabilities
- Vetting false positives
- Confirming remediation
- Building a vulnerability management program