What Is Vulnerability
What Is Vulnerability
Recommended Books:
A: Finding and fixing vulnerabilities in Information Systems: The Vulnerability
(Philip)
DR . JA M A L A N A S IR
Credit Hours: 3
Marks: 100
Distribution of Marks:
Assignments 10
Quizzes 10
Attendance 5
Mid Term Examination 25
Total Sessional 50
Terminal Examination 50
Total 100
Vulnerability Assessment
What is Vulnerability?
A vulnerability is a weakness that can be exploited by
cybercriminals to gain unauthorized access to a computer
system.
high-value assets
◦ Personal information
◦ Credit cards
◦ Health accounts
◦ Health Accounts is a methodology used to describe the systematic financial flow of the
consumption of health care goods and services.
◦ A Health Savings Account (HSA) is a type of personal savings account you can set up to pay
certain health care costs
Vulnerability…
◦ Business secrets
◦ Business Secrets means any information that derives from actual or potential economic
value for the fact that it is not known and that should not be accessed by any people.
◦ Intellectual property
◦ Intellectual property (IP) refers to creations of the mind, such as inventions; literary and
artistic works; designs; and symbols, names and images used in commerce
◦ and in short, Anything that they can sell on the black
market.
Vulnerability…
In addition:
◦ the exploited computer is now a beachhead (strategic
position) for further attacks into your network and it becomes
part of a platform that attacks the network of other
organizations.
Vulnerability…
• Security researchers are continually discovering flaws
in:
• software
• Faulty configurations of applications and
• IT gear (A software platform from Google for running applications
locally)
Vulnerability…
Whatever their source:
◦vulnerabilities don’t go away by themselves.
Study found that servers with open ports and other vulnerabilities
were scanned by attackers within about 23 minutes of being
attached to the Internet and
vulnerability probes(inquiries) started in 56 minutes.
The average time to the first exploit being made was less
than 19 hours.
• Programming mistakes
• Bugs
cause most vulnerabilities in software.
For example, a common mistake
– which happens in the memory management area of programs
– data blocks still being used after they’ve been declared free by
other parts of the programs.
Where do vulnerabilities come from?...
When this ‘use-after-free’ programming mistake is found by
attackers:
they can often exploit it and gain control over the computer.
Where do vulnerabilities come from?...