vulnerability management

David is a security professional working in an organization, and he is implementing a vulnerability management program in the organization to evaluate and control the risk and vulnerabilities in its IT infrastructure. He is currently executing the process of applying fixes on vulnerable systems to reduce the impact and severity of vulnerabilities. Which phase of the vulnerability-management life cycle is David currently in?

David is a security professional working in an organization, and he is implementing a vulnerability management program in the organization to evaluate and control the risk and vulnerabilities in its IT infrastructure. He is currently executing the process of applying fixes on vulnerable systems to reduce the impact and severity of vulnerabilities. Which phase of the vulnerability management life cycle is David currently in?

Option 1 : Vulnerability scan
Option 2 : Verification
Option 3 : Remediation
Option 4 : Risk assessment

1. Vulnerability scan

In this stage, Vulnerability scan will be performed to distinguishing weakness in the OS, web application, webserver, and different administrations. This stage assists with distinguishing the classification and criticality of Vulnerability management and limits the degree of danger.

Weakness Assessment Tasks:
  • Examine and assess current actual Security .
  • Identify miss-setup.
  • Identify Human mistakes.
  • Perform weakness looking over an instrument.
  • Prioritize the weaknesses.
  • Validate the weaknesses.
  • Create Vulnerability report.
2. Verification

This stage help to check all the past stages are appropriately utilized or not and furthermore play out the confirmation of cures

Assignment act in this stage:
  • Run Dynamic investigation
  • Attack Surface check
3. Remediation

Its allude to play out the means that utilization to alleviate the established weaknesses as per scan level. In this stage reaction group plan moderation cycle to cover weaknesses.

Remediation errands:
  • Prioritize proposals
  • Design an activity intend to execute the proposals
  • Perform Root source examination
  • Apply the arrangements
4. Risk assessment

In this stage hazard are distinguished, portrayed and grouped with hazard control procedures. Weaknesses are arrange dependent on effect level (like Low, Medium, High).

Learn CEH & Think like hacker


This Blog Article is posted by

Infosavvy, 2nd Floor, Sai Niketan, Chandavalkar Road Opp. Gora Gandhi Hotel, Above Jumbo King, beside Speakwell Institute, Borivali West, Mumbai, Maharashtra 400092

Contact us – www.info-savvy.com

https://g.co/kgs/ttqPpZ

Leave a Comment