What is Vulnerability Confirmation?
Determining the accuracy of identified potential security weaknesses
What is True Positive?
Real and exploitable vulnerability correctly identified
What is False Positive?
Occurs when the system states that a vulnerability exists on the system, but that vulnerability actually doesn’t exist
What is True Negative?
Correctly identifies the absence of a vulnerability
What is False Negative?
Serious finding– vulnerability exists but remains undetected
How are Vulnerabilites prioritized?
Factors include ease of exploitation, potential damage, system importance
What is CVE (Common Vulnerabilities and Exposures)?
A public database that lists known software and hardware vulnerabilities in a standardized way to uniquely identify and reference them
What is the EF (Exposure Factor)?
A quantifiable metric to estimate the percentage of asset damage
What is RIsk Tolerance?
The level of risk an organization is willing to accept in pursuit of its objectives and before action is deemed necessary to mitigate the risk