Ias101 Sbit3l W8sum Vida, John Paul S.
Ias101 Sbit3l W8sum Vida, John Paul S.
Ias101 Sbit3l W8sum Vida, John Paul S.
Vulnerability
- In cybersecurity, a vulnerability is a flaw in a system’s design, security procedures, internal controls, etc., that
can be exploited by cybercriminals.
- In some very rare cases, cyber vulnerabilities are created as a result of cyberattacks, not because of network
misconfigurations. Even it can be caused if any employee anyhow downloads a virus or a social engineering
attack.
Vulnerabilities could be of many types, based on different criteria, some of them are:
1. Network - Network vulnerability is caused when there are some flaws in the network’s hardware or
software.
2. Operating system - When an operating system designer designs an operating system with a policy that
grants every program/user to have full access to the computer, it allows viruses and malware to make changes
on behalf of the administrator.
3. Human- Users’ negligence can cause vulnerabilities in the system.
4. Process- Specific process control can also cause vulnerabilities in the system.
Risk - Cyber risk is a potential consequence of the loss or damage of assets or data caused by a cyber threat.
Risk can never be completely removed, but it can be managed to a level that satisfies an organization’s
tolerance for risk. So, our target is not to have a risk-free system, but to keep the risk as low as possible
To summarize it all, Risk is the potential for loss, damage or destruction of assets or data caused by a cyber
threat. Threat is a process that magnifies the likelihood of a negative event, such as the exploit of a
vulnerability. And a vulnerability is a weakness in your infrastructure, networks or applications that potentially
exposes you to threats.
Risk assessment - is an elemental part of an organization's risk management procedure, designed to support
appropriate security levels for its data systems and data.
“Operational Risks” - is a risk that includes errors because of the system, human intervention, incorrect data,
or because of other technical problems. Every firm or individual has to deal with such an operational risk in
completing any task/delivery.
Defense Mitigation
1. Authorized Local Network Devices. Ensure that the only devices connected to the organization’s network are
those items provided by the organization.
2. Operating System Patching/Updating. Organizations should have a documented patching policy as well as a
systematic, accountable, and documented set of processes and procedures for handling patches.
3. Operating System Hardening. Operating systems should be hardened to improve the ability to withstand
attacks.
4. Anti-Virus Updating. New viruses are discovered every day. It is therefore recommended to set anti-virus
applications to automatically update signature files and scan engines whenever the vendor publishes updates.
5. Change Control Process. Implement a change control process to document and review firewall and other
network changes before they are implemented.
6. Host-based Firewall. Consider implementing host-based firewalls running on each internal computer and
especially laptops assigned to mobile users.
7. Vulnerability Scanning. Routine vulnerability scanning is a valuable practice for every organization.
8. Use Of Proxy Servers and Web Content Filters. Implement outbound application layer proxy servers and web
content filters to prevent users from inadvertently being directed to malicious websites.
9. Email Attachment Filtering. Filter the following attachment types at your email gateway unless required for
business use.
10. Monitor Logs. Administrators should not rely solely on AV software and email filtering to detect worm
infections.