The Importance Of Vulnerability Assessments

Improved Essays
A
RISK-BASED
APPROACH
TO VULNERABILITY
REMEDIATION

Introduction

When it comes to data security, nothing is more important than understanding where you are most vulnerable. This is why many companies have realized that annual vulnerability assessments aren’t sufficient. Under a new vulnerability management model, successful companies have moved to monthly or quarterly scanning.
Vulnerability assessments are still only a small part of the battle, though. While increasing the frequency of tests has helped provide organizations with a much better understanding of their current security vulnerabilities, it has also created a significant challenge in that those responsible for fixing the vulnerabilities become overwhelmed.
This eBook outlines
…show more content…
But, like the saying goes, the hardest part of a long journey is the first step.
Deciding what to tackle and remediate from the vulnerability scanning reports becomes easier when using a risk management approach. Each vulnerability is automatically rated using a risk level of high, medium, or low—and sometimes informational ratings could be set as well. However, these” only address the risk of the vulnerability and don’t take into account the asset where the vulnerability resides. By introducing risk dimensions of assets—such as the applications or services they support, their criticality, their location, and other factors relevant to your organization—your business can make more educated and informed decisions on what to remediate first.
Currently, tools for identifying the severity of the findings are doing so without any context of the networks they are scanning. The results are twofold. First, there are thousands of recommended fixes. Second, the company’s team can’t keep up with the fixes or becomes defeated before the task even
…show more content…
By starting with a focus on your organization’s assets and protecting them, decisions about what to address become easier.
Saving your team’s time and ensuring that risks are being addressed in a consistent, repeatable fashion can become your reality. Start by gaining a greater understanding of your own environment, capturing all assets that are being scanned into some type of repository. Then, gather the ranking information about them.
Conclusion
Doing more than one vulnerability assessment a year is a good start, but today, it’s simply not enough. You must perform vulnerability scans on a regular basis, ideally monthly, with a methodology, and consistency to reduce your overall risk exposure in a meaningful fashion. Using your asset information and building risk dimensions, creating rules, quickly identifying risks, and implementing fixes is the key to a fully secure

Related Documents

  • Improved Essays

    Nt1330 Unit 2

    • 369 Words
    • 2 Pages

    Based on the findings obtained from the analysis of security information then compiled recommendations for improvement of the condition of the company. Some recommendations are: 1. Describe in detail the confidentiality agreement and specifically including maintaining the confidentiality of the password 2. Reexamination of the access rights of each and updating access rights in case of transfer of part or advancement in accordance with their respective access rights. 3.…

    • 369 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Nt1330 Unit 7

    • 1149 Words
    • 5 Pages

    1. Focus on the overall “security assessment” risk rating that appears at the top of your report. Considering what security measures you (or the computer owner) have undertaken for your computer, does the assessment surprise you? Why or why not? What measures should you plan to undertake if the green checkmark did not appear?…

    • 1149 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 1

    • 768 Words
    • 4 Pages

    1. Policies: Policies like Acceptable Use, Internet Access, and Email and Communications Policies can take the risk out of the user’s hands of doing what is right. Sites that could hold malicious codes and viruses can simply be blocked from access so that it isn’t even in their “hands” to make the decision. 2. Provision Servers: Using software like IPAM, making sure that your servers all have static addresses assigned to them.…

    • 768 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Ba501 Week 1 Assignment

    • 740 Words
    • 3 Pages

    BA501 Overview of Business Intelligence Week 1 Assignment David Nagus Grantham University Professor Jackson May 6, 2015 I Introduction With any business with a database system there are bound to be changes and different metrics used in the decisions of running a business. These days almost all businesses have a computer system or network of computers that are interlinked. One aspect of a business is how they secure their network and who has access to data and who does not. On a almost daily basis businesses are being targeted with threats from outside sources to steal data, cause harm or disrupt the daily workings of a business and affecting people's lives.…

    • 740 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    M4d1 Unit 1 Case Study

    • 556 Words
    • 3 Pages

    M4D1 I. Why do you think it is much more expensive to fix a security vulnerability late in the software life cycle, compared to early? It is almost always more costly to redo or rework something than to do it correctly in the first place. Years ago when I got my first Solaris system administration job, the Navy had the view that any job the Navy did not have official schools for could be learned via OJT (on the job training).…

    • 556 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Evaluate the risk and create policies and procedures to negate or reduce them. Educate and communicate with management and staff about risk factors. Rank risks according to likelihood of occurrences for each dept. Periodically review and update risks, and risks management programs. (Rubbens, 2007)…

    • 819 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    With the current knowledge and insight on the major threats and vulnerabilities the company faced with daily being dependent on the operating…

    • 650 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    CHEVRON’S INFRASTRUCTURE EVOLUTION Glad Bernard Toppo Campbellsville University The first two heading levels get their own paragraph, as shown here. Headings 3, 4, and 5 are run-in headings used at the beginning of the paragraph. Seismic Imaging Technology. How it works and how it has helped Chevron discover new oil and gas reservoirs. Also known as Reflection Seismology, this is an exploration method used by oil and gas companies to gauge and estimate the seismic characters of the Earth’s sub-surface.…

    • 952 Words
    • 4 Pages
    Superior Essays
  • Brilliant Essays

    (2006, February). Special Publication 800-18 REV 1: Guide For Developing Security Plans For Information Technology Systems. Retrieved October 30, 2015 from http://csrc.nist.gov/publications/nistpubs/800-18-Rev1/sp800-18-Rev1-final.pdf NIST - National Institute of Standards and Technology. (2012, September). Special Publication 800-30 REV 1: Guide for Conducting Risk Assessments.…

    • 1450 Words
    • 6 Pages
    Brilliant Essays
  • Superior Essays

    Metasploit Case Summary

    • 1006 Words
    • 5 Pages

    Eweek, 23(43), 18. Rapid7. (7). Rapid7 Metasploit Pro Increases Vulnerability Management Efficiency by Leveraging Penetration Testing Intelligence to Validate Security Risks.…

    • 1006 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    Odds are that in one’s lifetime a consumer will be a victim of a security breach at some point. Data breaches are on the rise, and businesses need to ensure that they have sufficient security defenses in place to protect their data. Data breaches can have both direct and indirect financial consequences for a business. After a breach, businesses must resolve the problem leading to the breach, deal with the repercussions and come up with ways to limit risks in the future. When a security breach occurs in a business, it can have many negative affects on the business, such as negative press, loss of consumer loyalty, diminished brand reputation and even lawsuits.…

    • 855 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Digital literacy and Cyber-resilience are quickly becoming important governance priorities for boards around the globe and will no doubt be increasingly important risk management issues for the Royal Canadian Mint. I am particularly aware of the complex cyber-vulnerabilities specific as well as customer and employee databases. I am an experienced and respected communicator. My articles on business, law, and cyber-security matters are well received internationally.…

    • 348 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Identifying and managing risks is a critical responsibility of project managers. Risk is defined as the probability of a specified threat and the subsequent impact that the event produces (Vaidyanathan, 2013). Risks can also bring about either positive or negative outcomes for a project or organization. A project manager must identify potential risks and evaluate each one to determine the severity and likelihood of each event. Only by completing the risk management process, a project manager can determine what approach would work best to avoid, mitigate, and/or transfer the risk.…

    • 730 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    A Vulnerability Assessment needs to be completed to identify weaknesses in the network security configuration in order to suggest changes. We must keep in mind that documentation on how the network systems are configured is critical for the recovery process during a penetrating testing. Vulnerability Assessments are designed to identify network weaknesses and help coming with security improvements and remedies. Penetration testing is a testing method that tries to exploit a weakness in the system to prove that an attacker could successfully penetrate it.…

    • 706 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    My main goal is to conduct a CIA Triad (Confidentiality, Integrity, and Availability) to the information system by providing and ensuring this is practiced by my employees. But before being able to manage these goals I would have to look deep into the company vulnerabilities and reduce any possible risk to an acceptable level. There are several decisions I can make upon the risk findings discover such as Risk Mitigation. In this process patches may be install to help reduce the risk or fix the problem that originated. With the standards, regulations, and policies implemented a guidebook will be form that will show the guidance to take if certain threats arise that can harm the company.…

    • 700 Words
    • 3 Pages
    Improved Essays

Related Topics