There are more devices connected to the internet than ever before. 这对攻击者来说就是音乐, as they make good use of machines like printers 和 cameras which were never designed to ward off sophisticated invasions. It's led companies 和 individuals alike to rethink how safe their networks are.
随着这些事件的增多, so does the way we need to classify the dangers they pose to businesses 和 consumers alike. Three of the most common terms thrown around when discussing cyber risks are vulnerabilities, 利用, 和威胁.
了解 7种常见的网络攻击类型.
Mistakes happen, even in the process of building 和 coding technology. What’s left behind from these mistakes is commonly referred to as a bug. While bugs aren’t inherently harmful (except to the potential performance of the technology), many can be taken advantage of by nefarious actors—these are known as vulnerabilities. Vulnerabilities can be leveraged to force software to act in ways it’s not intended to, such as gleaning information about the current security defenses in place.
Once a bug is determined to be a vulnerability, it is registered by MITRE as a CVE, 或常见的弱点或暴露, 和 assigned a Common 脆弱性 Scoring System (CVSS) score to reflect the potential risk it could introduce to your organization. 这 central listing of CVEs serves as a reference point for 漏洞管理解决方案.
Generally speaking, a vulnerability scanner will scan 和 compare your environment against a 漏洞数据库, or a list of known vulnerabilities; the more information the scanner has, 其性能越准确. Once a team has a report of the vulnerabilities, developers can use 渗透测试 作为发现弱点的一种手段, so the problem can be fixed 和 future mistakes can be avoided. 当使用频繁和一致的扫描, you'll start to see common threads between the vulnerabilities for a better underst和ing of the full system. 了解更多关于 漏洞管理和扫描.
安全漏洞是一个弱点, 缺陷, or error found within a security system that has the potential to be leveraged by a threat agent in order to compromise a secure network.
There are a number of Security Vulnerabilities, but some common examples are:
Vulnerabilities of all sizes can result in data leaks, 和 eventually, data breaches. 什么是数据泄漏? A data leak occurs when data is accidentally leaked from within an organization, 而不是数据泄露, 数据被盗的结果是什么. 数据泄漏 通常是一个错误的结果吗. For example: sending a document with sensitive or confidential information to the wrong email recipient, 将数据保存到公有云文件共享, or having data on an unlocked device in a public place for others to see.
Exploitation is the next step in an attacker's playbook after finding a vulnerability. Exploits are the means through which a vulnerability can be leveraged for malicious activity by hackers; these include pieces of software, 命令序列, 或者甚至是开源的漏洞利用工具包.
A threat refers to the hypothetical event wherein an attacker uses the vulnerability. 威胁本身通常会包含一个漏洞, 因为这是黑客采取行动的常见方式. A hacker may use multiple 利用 at the same time after assessing what will bring the most reward. While nothing disastrous may have happened yet at this stage, it can give a security team or individual insight into whether or not an action plan needs to be made regarding specific security measures.
While it may seem like you’re constantly hearing about a new attack or cyber threat in the world, these terms can help give further context to the stages 和 dangers that security professionals deal with on a daily basis. 那么,你能做些什么来降低整体风险呢? 积极主动的方法, scan your environment for vulnerabilities with a vulnerability management tool. 为了对不想要的活动保持反应, 安全信息和事件管理(SIEM) is a systematic process that can make it easier to control what's happening on your network. SIEM tools can help companies set up strong, proactive defenses that work to fend off or 补丁 threats, 利用, 和 vulnerabilities to keep their environment safe.