72 - Vulnerabilities and Incident Response

Vulnerability

A weakness in a system that may be exploited to carry out an attack

Nature

Vulnerabilities can be unintentional (bugs,flaws) or intentional (backdoors)

Domain

What these vulnerabilities impact, one of three, Technology, Organization or Human

Sources of Bugs

Bugs can arise from People, Procedures or Tools, e.g. inexperience, misuse or damaged/unsuitable tools

Sources of Flaws

Lack of education, ignorance(human), insufficient coverage or misconceptions

VAPT

Vulnerability Assessment & Penetration Testing

Backdoor Intentionality

Backdoors can be unintentional, though they are still vulnerabilities

Incident Response

Protocol for responding to security events. Mix of talents suitable for the threat, with each team having the leader CISO (Chief Information Security Officer)

Incident Response Infrastructure

  • CSIRT - Computer Security Incident Response Team
  • SOC - Security Operations Center
  • SIEM - Security Information and Event Management