Vulnerability

18th December 2019 | Cybrary Vulnerability

cyber security vulnerability

 

Image Source

A vulnerability is a characteristic or specific weakness that renders an organization or asset (such as information or an information system) open to exploitation by a given threat or susceptible to a given hazard. In cyber security specifically, it is a characteristic of location or security posture or of design, security procedures, internal controls, or the implementation of any of these that permit a threat or hazard to occur. Vulnerability (expressing degree of vulnerability): qualitative or quantitative expression of the level of susceptibility to harm when a threat or hazard is realized.

vulnerability in plain english.  If you leave a movie and a mugger jumps out of the bushes to rob you.  Whether you’re vulnerable to the threat actor (the Mugger) depends on the weapon they are using and your defensive posture.  For example: if the mugger has a knife but you are a black belt in Karate, you may not be vulnerable to the threat.  If on the other hand the mugger has a gun and you are not trained in marshal arts of any kind, you may be vulnerable.

Related Term: WeaknessThreat

Source: DHS Risk Lexicon, CNSSI 4009, NIST SP 800-53 Rev 4

Latest Blogs

Stay sharp with the latest security insights

Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.

Microsoft Integrates Passkeys into Windows: is this the start of a Passwordless Future?

Microsoft Integrates Passkeys into Windows: is this the start of a Passwordless Future?

Let’s be honest, who hasn’t reset a password at least once this month? For decades, passwords have been our...

Read more
When You Become the Hacker: How Modern Attacks Trick You Into Hacking Yourself

When You Become the Hacker: How Modern Attacks Trick You Into Hacking Yourself

In a shift away from the usual “hack-meets-victim” narrative, a new kind of cyber-assault is emerging. One...

Read more
Domain Takedowns: How to Remove Fraudulent and Typo-squatted Domains and Websites

Domain Takedowns: How to Remove Fraudulent and Typo-squatted Domains and Websites

In cybersecurity, not all attacks happen through fancy malware or zero-day exploits. Some of the most effective...

Read more