Jump to content

Vulnerability management

From Wikipedia, the free encyclopedia

This is an old revision of this page, as edited by 198.96.180.245 (talk) at 15:37, 11 December 2015. The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

Vulnerability management is the "cyclical practice of identifying, classifying, remediating, and mitigating vulnerabilities",[1] especially in software and firmware. Vulnerability management is integral to computer security and network security.

Vulnerabilities can be discovered with a vulnerability scanner, which analyzes a computer system in search of known vulnerabilities,[2] such as open ports, insecure software configuration, and susceptibility to malware. Unknown vulnerabilities, such as a zero-day attack[2] may be found with fuzz testing, which can identify certain kinds of vulnerabilities, such as a buffer overflow exploit with relevant test cases. Such analysis can be facilitated by test automation. In addition, antivirus software capable of heuristic analysis may discover undocumented malware if it finds software behaving suspiciously (such as attempting to overwrite a system file).

Correcting vulnerabilities may variously involve the installation of a patch, a change in network security policy, reconfiguration of software (such as a firewall), or educating users about social engineering.

See also

References

  1. ^ Foreman, P: Vulnerability Management, page 1. Taylor & Francis Group, 2010. ISBN 978-1-4398-0150-5
  2. ^ a b Anna-Maija Juuso and Ari Takanen Unknown Vulnerability Management, Codenomicon whitepaper, October 2010 [1].
  • "Total Cost of Ownership for Vulnerability Management". NopSec blog.
  • Perraudeau, Eric (19 August 2009). "Q&A: Vulnerability management" (Interview). Interviewed by Mirko Zorz. Retrieved 28 June 2013.
  • "Unknown Vulnerability Management: Webcasts". Codenomicon Defensics. Codenomicon. Retrieved 27 June 2013.