logo

Risk Management

9 Pages2006 Words299 Views
   

Added on  2023-04-22

About This Document

This document discusses vulnerability scans, threat vectors, types of vulnerabilities, attack surface, OCTAVE, CVSSv2, and the relationship between vulnerability, threat, and risks with examples using mathematical calculations.

Risk Management

   Added on 2023-04-22

ShareRelated Documents
Running head: RISK MANAGEMENT
Risk Management
Name of the Student:
Name of the University:
Risk Management_1
1RISK MANAGEMENT
Table of Contents
1. Differentiation between vulnerability scans and vulnerability assessment.................................2
2. The effect of threat vectors in vulnerability assessment..............................................................2
3. Different types of vulnerabilities and their causes......................................................................3
4. Attack surface and vulnerability assessment...............................................................................4
5. Analysis of the use of operational critical threat, asset, and vulnerability evaluation
(OCTAVE) and the common vulnerability scoring system (CVSSv2) as open vulnerability
scoring systems................................................................................................................................5
6. Development of a relationship between vulnerability, threat, and risks with examples using
mathematical calculations................................................................................................................6
References........................................................................................................................................7
Risk Management_2
2RISK MANAGEMENT
1. Differentiation between vulnerability scans and vulnerability assessment
The concepts of vulnerability scans and vulnerability assessment are important processes
which are used in network security to ensure that the system can function properly and there are
not getting attacks with Trojans and viruses (Mattsson & Jenelius, 2015). Difference between
vulnerability scans and vulnerability assessment is shown as follows:
Vulnerability assessment is a process comprise of range of various sub-processes. This
process deals to identify, quantify and rank various vulnerabilities might present in the system
(Swartz et al., 2015). It is considered as important step in the company as it wants to prevent of
unauthorized access to the system.
Vulnerability scans is carried out for various resources to determine possible
vulnerabilities lie in network system. This process permits the company to search whether the
resources are being vulnerable or not. Vulnerability scanning is automatic software is linked to
set database of recognized flaws. It runs through network to discover whether flaws are existed
or not (Singhal & Ou, 2017). The vulnerability scan is being completed and detailed report is
made of findings permits the company to hire network Security Company help to reinforce the
defenses of company.
2. The effect of threat vectors in vulnerability assessment
The threat vector is a method used to turn on threat and create from three sources such as
external, internal and supply chain. Effect of threat vector is to gain access to device, system as
well as network to launch attacks, collect information and deliver malicious items in network
system (Ganin et al., 2017). The vulnerability assessment helps the business organization to
Risk Management_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
System Management : Discussions
|4
|604
|25

Cyber Security Analysis Report
|7
|1356
|51

Importance of Cyber Security in Protecting Against Cyber Attacks
|26
|8270
|85

Risk management plan – single risk Company name: MyHealth.
|2
|432
|40

Prevention of DoS Attacks: Methods and Strategies
|12
|2585
|100

Information Systems Security: IT Security Fundamentals, Vulnerabilities, and IBM Security Architecture
|5
|747
|57