Vulnerability Management Flashcards
(84 cards)
What is the first step in the vulnerability management process?
Asset inventory (identifying what you have)
What is a CVE?
Common Vulnerabilities and Exposures (public ID for a specific vulnerability)
What does CVSS stand for?
Common Vulnerability Scoring System
What does CVSS measure?
The severity of a vulnerability (scale of 0–10)
What is a compensating control?
An alternative security measure used when a patch cannot be applied
What is patch management?
The process of acquiring, testing, and deploying software updates
What is a zero-day vulnerability?
A vulnerability that is exploited before a patch is available
What is the difference between authenticated and unauthenticated scanning?
Authenticated scans log in to the system for deeper analysis
What is the benefit of an authenticated scan?
More accurate results with fewer false positives
What is a false positive in vulnerability scanning?
An alert for a vulnerability that doesn’t actually exist
What is a false negative?
A vulnerability that exists but is not detected
Why is it important to prioritize vulnerabilities?
Limited resources require focusing on the highest risk to the business
What factors influence vulnerability prioritization?
CVSS score, exploitability, asset value, business impact
What is vulnerability remediation?
Fixing the vulnerability (e.g., patching, reconfiguring)
What is vulnerability mitigation?
Reducing the impact or likelihood of exploitation without fully fixing it
What is vulnerability acceptance?
Choosing to do nothing based on acceptable risk
What is the purpose of a vulnerability scanner?
To identify known weaknesses in systems and software
What is the purpose of a scan baseline?
To compare future scans and detect changes over time
What is a scan credential?
A username/password or key that allows deeper scanning access
What is a patch window?
A scheduled time frame when updates can be safely applied
What is the HIPAA compliance framework for?
HIPAA, the Health Insurance Portability and Accountability Act of 1996, is a US federal law that establishes national standards for protecting sensitive patient health information. It aims to safeguard patient privacy, secure health information, and control healthcare administrative costs.
What is the PCI DSS compliance framework for?
Payment Card Industry Data Security Standard / Credit card payment processing
What is the FISMA compliance framework for?
FISMA, the Federal Information Security Modernization Act, is a United States federal law designed to protect government information and operations from cyber threats. It establishes a framework of guidelines and security standards for federal agencies and their contractors to safeguard sensitive information
What are two examples where vulnerability scanning is required (legal/regulatory)?
PCI DSS
FISMA