漏洞、利用和威胁的解释

There are more devices connected to the internet than ever before. 这对攻击者来说就是音乐, as they make good use of machines like printers 和 cameras which were never designed to ward off sophisticated invasions. It's led companies 和 individuals alike to rethink how safe their networks are.

随着这些事件的增多, so does the way we need to classify the dangers they pose to businesses 和 consumers alike. Three of the most common terms thrown around when discussing cyber risks are vulnerabilities, 利用, 和威胁.

了解 7种常见的网络攻击类型.

什么是漏洞?

Mistakes happen, even in the process of building 和 coding technology. What’s left behind from these mistakes is commonly referred to as a bug. While bugs aren’t inherently harmful (except to the potential performance of the technology), many can be taken advantage of by nefarious actors—these are known as vulnerabilities. Vulnerabilities can be leveraged to force software to act in ways it’s not intended to, such as gleaning information about the current security defenses in place.

Once a bug is determined to be a vulnerability, it is registered by MITRE as a CVE, 或常见的弱点或暴露, 和 assigned a Common 脆弱性 Scoring System (CVSS) score to reflect the potential risk it could introduce to your organization. 这 central listing of CVEs serves as a reference point for 漏洞管理解决方案.

Generally speaking, a vulnerability scanner will scan 和 compare your environment against a 漏洞数据库, or a list of known vulnerabilities; the more information the scanner has, 其性能越准确. Once a team has a report of the vulnerabilities, developers can use 渗透测试 作为发现弱点的一种手段, so the problem can be fixed 和 future mistakes can be avoided. 当使用频繁和一致的扫描, you'll start to see common threads between the vulnerabilities for a better underst和ing of the full system. 了解更多关于 漏洞管理和扫描.

安全漏洞示例

安全漏洞是一个弱点, 缺陷, or error found within a security system that has the potential to be leveraged by a threat agent in order to compromise a secure network.

There are a number of Security Vulnerabilities, but some common examples are: 

    • 破碎的认证: 当身份验证凭证泄露时, user sessions 和 identities can be hijacked by malicious actors to pose as the original user. 
    • SQL注入: 作为最普遍的安全漏洞之一, SQL injections attempt to gain access to database content via malicious code injection. A successful SQL injection can allow attackers to steal sensitive data, 假的身份, 和 participate in a collection of other harmful activities.
    • 跨站点脚本编制: 很像SQL注入, a Cross-site scripting (XSS) attack also injects malicious code into a website. 然而, 跨站脚本攻击是针对网站用户的攻击, 而不是网站本身, 这会使敏感的用户信息面临被盗的风险.
    • 跨站点请求伪造: A 跨站点请求伪造 (CSRF) attack aims to trick an authenticated user into performing an action that they do not intend to do. 这, 与社会工程相结合, can deceive users into accidentally providing a malicious actor with personal data. 
    • 安全错误配置: Any component of a security system that can be leveraged by attackers due to a configuration error can be considered a “Security Misconfiguration.” 

Vulnerabilities of all sizes can result in data leaks, 和 eventually, data breaches. 什么是数据泄漏? A data leak occurs when data is accidentally leaked from within an organization, 而不是数据泄露, 数据被盗的结果是什么. 数据泄漏 通常是一个错误的结果吗. For example: sending a document with sensitive or confidential information to the wrong email recipient, 将数据保存到公有云文件共享, or having data on an unlocked device in a public place for others to see.

什么是网络安全漏洞?

Exploitation is the next step in an attacker's playbook after finding a vulnerability. Exploits are the means through which a vulnerability can be leveraged for malicious activity by hackers; these include pieces of software, 命令序列, 或者甚至是开源的漏洞利用工具包. 

什么是网络威胁?

A threat refers to the hypothetical event wherein an attacker uses the vulnerability. 威胁本身通常会包含一个漏洞, 因为这是黑客采取行动的常见方式. A hacker may use multiple 利用 at the same time after assessing what will bring the most reward. While nothing disastrous may have happened yet at this stage, it can give a security team or individual insight into whether or not an action plan needs to be made regarding specific security measures.

While it may seem like you’re constantly hearing about a new attack or cyber threat in the world, these terms can help give further context to the stages 和 dangers that security professionals deal with on a daily basis. 那么,你能做些什么来降低整体风险呢? 积极主动的方法, scan your environment for vulnerabilities with a vulnerability management tool. 为了对不想要的活动保持反应, 安全信息和事件管理(SIEM) is a systematic process that can make it easier to control what's happening on your network. SIEM tools can help companies set up strong, proactive defenses that work to fend off or 补丁 threats, 利用, 和 vulnerabilities to keep their environment safe.

最新的补丁更新、漏洞和漏洞利用