Systematic practice of spotting and categorizing weakness in a system, network, or application that could potentially be exploited.
Identifying Vulnerabilities
Automated method of probing networks, system, and applications to disaster potential vulnerabilities
Vulnerability Scanning
Used to safeguard the software from being manipulated during it’s lifecycle.
Application Security
Used to analyze an application’s source code without executing it.
Static Analysis
Evaluates an application as it is being run to determine if there are any vulnerabilities in the application.
Dynamic Analysis
Ensures that the libraries and components that the application depends on are secure and up-to-date.
Package Monitoring
Continual process used to understand the threats faced by an organization
Threat Intelligent
Continuous stream of data related to potential or current threats to an organization’s security
Threat Intel Feeds
Intel that is collected from publicly available sources including reports, forums, news articles, blogs, and social media posts.
OSINT
Threat intel feeds that are provided by commercial vendors, usually under a subcription service tyoe of business model
Proprietary or Third-party Feeds
Term used to describe the ethical practice where a security researcher discloses information about vulnerabilities in a software, hardware, or online services
Responsible Disclosure
System that provides a standardized way to uniquely identify and reference known vulnerabilities in software and hardware.
CVE
Used as quantifiable metric to help a cybersecurity professional understand the exact % of an asset that is likely to be damaged or affected if a particular vulnerability is exploited
EF
Strategies that identify, access, and address vulnerabilities in a system or network to strengthen an organization’s security posture.
Vulnerability Response and Remediation
Apply software updates to fix security vulnerabilities
Patching
Procuring insurance policies to mitigate financial losses from cyber incidents
Purchasing Cybersecurity Insurance Policies
Dividing a network into smaller segments for improves security and performance.
Network Segmentation
Temporarily relaxes security controls for operational business needs.
Exception
Permanently waives controls for specific reasons such as when using a legacy system
Exemption
Process of documenting and communicating details about security weaknesses identified in software or systems to the individuals or organizations responsible for addressing the issue
Vulnerability Reporting