Scimyst
Subscribe
  • Home
  • Discoveries
    • All
    • 1001 Mysteries
    • Aliens & UFOs
    • Animal World
    • Archaeology
    • Biology
    • Doomsday
    • Famous Landmarks
    • History
    • Mars Exploration
    • Military Science
    • Oceanography
    • Science Q&A
    • Scientific Discoveries
    • Space Science
    • Why
    • World Figures
    • World Wonders
    thanh pho trang 650

    The Lost City of 500 Years Containing Flesh-Eating Parasites

    creating the worlds first plasma lamp not using a wire just throw it away 133669

    Creating the world’s most durable plasma lamp that doesn’t “take a break” after a few days of use

    which country suffers the most natural disasters in the world every year 136695

    Which country suffers the most natural disasters in the world, “experiencing” the most super typhoons each year?

    strange spc exoplanet

    10 Most Strange Things of the Universe

    thuan tay trai 650

    Left-Handed People and 16 “Shocking” Facts

    cham do ben khoe mieng 650

    The Secret of the Two Red Dots at the Corner of the Mouth of the Tang Dynasty Concubine

    tinh van con cua 650

    Revealing Unseen Images of the Crab Nebula through the James Webb Space Telescope

    cau hon o phap 650

    Banning Bathing, Forcing Tears, and Strange Wedding Customs Around the World

    isaac Newton1

    10 Famous Inventions of Isaac Newton

    Trending Tags

    • Events
      • All
      • Science Stories
      • Scientific Projects

      Tonight announces the Ig Nobel Prize winners

      frog

      Frog Wins Ig Nobel Prize 2005

      canhcutIg

      Life is Not Lacking in Quirks

      Nobel Prize in Medicine 2005: A Modern Fairy Tale

      10 Weird Inventions Awarded the Ig Nobel Prize 2005

      nobelKT

      Why Did They Win the Nobel Prize in Economics?

      giaydientu

      “Electronic Paper” Set to Appear on the Market

      Development of Science and Technology in the South Central Coast and Central Highlands Provinces

      a russian scientist loves vietnam 1659

      A Russian Scientist Who Loves Vietnam

    • Lifestyle
      • All
      • Environment
      • Medicine & Health
      tdnong

      Global warming may be the cause of major storms

      traxanh1

      Green tea has effects against dementia

      Discovery of Cancer-Preventing Genes in the Human Body

      Khachdulich Indonesia

      Avian influenza harms tourism more than terrorism

      nao

      Lying – A Disease of People with Brain Defects

      cafe

      Coffee May Prevent Cancer

      tebaocum

      Recreating the ‘Death’ Flu Virus of 1918

      Indo ban

      The whole world unites to fight avian influenza

      HIV aids

      The Mystery of AIDS Epidemic

      Trending Tags

      • Technology
        • All
        • AI - Artificial Intelligence
        • Computer Science
        • New Technology
        • Scientific Inventions
        top apps explore space solar system on pc 98000

        Top Applications for Exploring the Universe and Solar System on PC

        vai dien tu 650

        Soon there will be data-transmitting clothing

        sua loi khong vao dc coc coc 650

        Why can’t Cốc Cốc download videos to the computer?

        may tinh cu 1

        17 Things You Can Do with an Old Computer

        play free games super fun on android devices 54708

        Play Extremely Fun Free Games on Android Devices

        top 10 best weather apps on android 98127

        Top 10 Best Astronomy Apps on Android

        canh tay robot 650

        Robot system helps neutralize mines

        trang trai noi o rotterdam 650

        Modern Cities Combining Gardens and Cattle Farms

        city tree 650

        “High-tech” trees can purify polluted air

      • Cultural Heritage
        ai cap 650

        The Ruins of Memphis & the Pyramid Complex from Giza to Dahshur – Egypt

        khao co 650

        Prehistoric Archaeological Sites in the Dordogne Valley and Caves in the Vézère Valley – France

        baroque churches philippines 67188

        Baroque Churches – Philippines

        mont saint michel france 67265

        Mont Saint Michel Island – France

        acropolis bracelet in athens greece 67621

        Acropolis Fortress in Athens – Greece

        language mo tan thuy hoang china 67087

        Tomb of Qin Shi Huang – China

        historical city ayutthaya 67804

        Historical City of Ayutthaya

        historical city ayutthaya 67804 2

        Historic City of Ayutthaya

        mesa verde national park 67201

        Mesa Verde National Park – United States of America

        Trending Tags

        • Entertainment
          • All
          • Photo Library
          • Videos

          Honesty

          Telephone

          Advanced Technology

          Terminal Illness

          Allergy

          Love Like Mars

          Super Definition

          Coi Sách

          Selling Candy

        No Result
        View All Result
        Scimyst
        • Home
        • Discoveries
          • All
          • 1001 Mysteries
          • Aliens & UFOs
          • Animal World
          • Archaeology
          • Biology
          • Doomsday
          • Famous Landmarks
          • History
          • Mars Exploration
          • Military Science
          • Oceanography
          • Science Q&A
          • Scientific Discoveries
          • Space Science
          • Why
          • World Figures
          • World Wonders
          thanh pho trang 650

          The Lost City of 500 Years Containing Flesh-Eating Parasites

          creating the worlds first plasma lamp not using a wire just throw it away 133669

          Creating the world’s most durable plasma lamp that doesn’t “take a break” after a few days of use

          which country suffers the most natural disasters in the world every year 136695

          Which country suffers the most natural disasters in the world, “experiencing” the most super typhoons each year?

          strange spc exoplanet

          10 Most Strange Things of the Universe

          thuan tay trai 650

          Left-Handed People and 16 “Shocking” Facts

          cham do ben khoe mieng 650

          The Secret of the Two Red Dots at the Corner of the Mouth of the Tang Dynasty Concubine

          tinh van con cua 650

          Revealing Unseen Images of the Crab Nebula through the James Webb Space Telescope

          cau hon o phap 650

          Banning Bathing, Forcing Tears, and Strange Wedding Customs Around the World

          isaac Newton1

          10 Famous Inventions of Isaac Newton

          Trending Tags

          • Events
            • All
            • Science Stories
            • Scientific Projects

            Tonight announces the Ig Nobel Prize winners

            frog

            Frog Wins Ig Nobel Prize 2005

            canhcutIg

            Life is Not Lacking in Quirks

            Nobel Prize in Medicine 2005: A Modern Fairy Tale

            10 Weird Inventions Awarded the Ig Nobel Prize 2005

            nobelKT

            Why Did They Win the Nobel Prize in Economics?

            giaydientu

            “Electronic Paper” Set to Appear on the Market

            Development of Science and Technology in the South Central Coast and Central Highlands Provinces

            a russian scientist loves vietnam 1659

            A Russian Scientist Who Loves Vietnam

          • Lifestyle
            • All
            • Environment
            • Medicine & Health
            tdnong

            Global warming may be the cause of major storms

            traxanh1

            Green tea has effects against dementia

            Discovery of Cancer-Preventing Genes in the Human Body

            Khachdulich Indonesia

            Avian influenza harms tourism more than terrorism

            nao

            Lying – A Disease of People with Brain Defects

            cafe

            Coffee May Prevent Cancer

            tebaocum

            Recreating the ‘Death’ Flu Virus of 1918

            Indo ban

            The whole world unites to fight avian influenza

            HIV aids

            The Mystery of AIDS Epidemic

            Trending Tags

            • Technology
              • All
              • AI - Artificial Intelligence
              • Computer Science
              • New Technology
              • Scientific Inventions
              top apps explore space solar system on pc 98000

              Top Applications for Exploring the Universe and Solar System on PC

              vai dien tu 650

              Soon there will be data-transmitting clothing

              sua loi khong vao dc coc coc 650

              Why can’t Cốc Cốc download videos to the computer?

              may tinh cu 1

              17 Things You Can Do with an Old Computer

              play free games super fun on android devices 54708

              Play Extremely Fun Free Games on Android Devices

              top 10 best weather apps on android 98127

              Top 10 Best Astronomy Apps on Android

              canh tay robot 650

              Robot system helps neutralize mines

              trang trai noi o rotterdam 650

              Modern Cities Combining Gardens and Cattle Farms

              city tree 650

              “High-tech” trees can purify polluted air

            • Cultural Heritage
              ai cap 650

              The Ruins of Memphis & the Pyramid Complex from Giza to Dahshur – Egypt

              khao co 650

              Prehistoric Archaeological Sites in the Dordogne Valley and Caves in the Vézère Valley – France

              baroque churches philippines 67188

              Baroque Churches – Philippines

              mont saint michel france 67265

              Mont Saint Michel Island – France

              acropolis bracelet in athens greece 67621

              Acropolis Fortress in Athens – Greece

              language mo tan thuy hoang china 67087

              Tomb of Qin Shi Huang – China

              historical city ayutthaya 67804

              Historical City of Ayutthaya

              historical city ayutthaya 67804 2

              Historic City of Ayutthaya

              mesa verde national park 67201

              Mesa Verde National Park – United States of America

              Trending Tags

              • Entertainment
                • All
                • Photo Library
                • Videos

                Honesty

                Telephone

                Advanced Technology

                Terminal Illness

                Allergy

                Love Like Mars

                Super Definition

                Coi Sách

                Selling Candy

              No Result
              View All Result
              Scimyst
              No Result
              View All Result
              Home Technology Computer Science

              5 Common Mistakes in Vulnerability Management

              by Sci
              January 23, 2006
              in Computer Science
              0
              Share on FacebookShare on Twitter

              securityIn the eyes of some, managing vulnerabilities is considered one of the specialized security management activities. Others believe that it is merely a necessary process that Microsoft must undertake to release monthly updates. Additionally, many view it as just a “common marketing term” used by business professionals.

              Through the following article, we aim to highlight some common mistakes that organizations should pay attention to in order to achieve excellence in vulnerability management from both technological and procedural perspectives.

              1. Scanning without taking any action

              The first common mistake is performing scans to identify security vulnerabilities but failing to take any responsive actions based on the results obtained. Security scanning and vulnerability detection experts have become mere “checklists” in many organizations. Vulnerability scanning technology has indeed seen significant advancements in recent years, evidenced by improvements in accuracy, speed, and safety of the tools used.

              However, modern commercial tools or open-source scanners still suffer from a problem similar to that of Intrusion Detection Systems (IDS). First, these tools generate excessive alerts for various reasons, making them too noisy. Furthermore, they do not inform you about how to address the generated security alerts, much like IDS do not tell you which specific intrusion alert to focus on.

              Thus, vulnerability management is not merely about scanning and detecting; what is crucial is the actions taken after performing the scanning process. This includes asset inventory, prioritization, and researching remediation activities, as well as practical actions such as patching, reconfiguring, or securing systems.

              2. Considering patching vulnerabilities as equivalent to vulnerability management

              In reality, patching vulnerabilities is merely a method of repairing known security flaws. Some industry experts even suggest that vulnerability management is as simple as just fixing all the troublesome issues.

              However, many security vulnerabilities cannot be simply patched by updating to the latest version of applications; they often require changes or reconfiguration of various system parameters. Therefore, vulnerability management necessitates prioritizing and intelligently remediating identified vulnerabilities using patches or other methods.

              Thus, if you are busy every minute on the third day of the month but do not take any action to eliminate security vulnerabilities in your organization for the remaining 29 days, you are not genuinely engaging in vulnerability management.

              3. Assuming that vulnerability management is solely a technical issue

              If you believe that vulnerability management is simply a technical issue, that is quite surprising. To achieve effectiveness in this task, it requires attention to improving policies and processes. In fact, focusing on processes and the “soft” aspects of vulnerability management often yields more benefits than a high-tech patching system. Many weaknesses still exist in policies and IT infrastructure. We will not address weaknesses in policies here, as these can sometimes be considered vulnerabilities. For example, if you do not enforce a policy requiring passwords of a certain length, that is a weakness or vulnerability in your policy, which scanning and detection experts may not uncover, resulting in no solutions for the issue.

              Therefore, weak passwords, lack of awareness regarding data security, and absence of workstation configuration standards can inflict more damage on your security posture and increase the risks you face.

              According to analysts at Gartner: “The vulnerability management process should include tasks such as defining policies, identifying environmental boundaries, prioritizing, protecting, mitigating losses, as well as monitoring and maintaining.”

              Thus, according to this understanding, the vulnerability management process should begin with a document defining policies regarding issues such as organizational resources – applications or systems – along with user considerations. Such a document, along with other security processes, should define the scope of vulnerability management and the “acceptable” stages of IT resource maturity.

              4. Assessing a vulnerability without considering the bigger picture

              Individuals attempting to adhere to a logical vulnerability management process often commit this common error. When facing serious challenges in prioritizing the remediation of vulnerabilities, they frequently overlook the dangerous aspects of that prioritization. For instance, they may try to assess the importance of vulnerabilities based solely on the vulnerabilities themselves without considering the overall security threat landscape and the business roles of the affected systems.

              The only way to avoid this fourth common mistake is to use the formula Risk = Threat x Vulnerability x Value and apply the results of this calculation to decide which vulnerabilities to prioritize for remediation.

              However, to establish a smart prioritization of vulnerability remediation, you must consider other factors in your IT environment as well as external factors. These factors include:

              – The severity of vulnerabilities
              – Information related to security threats
              – Business value and information about targeted systems

              Recently, a new standard for classifying the severity of vulnerabilities has been introduced to help organizations prioritize which vulnerabilities need to be fixed. The Common Vulnerability Scoring System (CVSS) evaluates various characteristics of vulnerabilities such as priority, exploitability, and impact. CVSS is expected to provide a unified method for scoring vulnerability assessments and will soon be adopted by many security information providers. However, CVSS data still requires updates to include information on business value and threats.

              Business information is crucial in prioritizing vulnerabilities because it can integrate technical threats and data vulnerabilities into a business function. Different organizations vary in every aspect, thus possessing different critical assets and applications. Attacks affecting some organizations can lead to bankruptcy, while for others, it might only mean a temporary disruption. However, in real life, the situation is not that straightforward, and lower-priority vulnerabilities can sometimes pave the way for exploiting more critical vulnerabilities.

              5. Failing to adequately prepare for the unknown – Zero-day security vulnerabilities

              The fifth common mistake is related to “zero-day exploits.” This type of vulnerability is a significant concern for many security managers. There is still a lot of confusion about what constitutes a “zero-day exploit.” Simply put, it is the exploitation of a vulnerability that has not been previously disclosed. Therefore, even if you have patched all known vulnerabilities, you still need to prepare for attacks by adversaries utilizing previously unknown vulnerabilities.

              What should you do? In addition to a sensitive vulnerability management program, you should have a comprehensive set of tasks in place that can protect you from “zero-day exploits” and carefully monitor server security. Additionally, you need to ensure that all response plans are ready in case of an attack. Such situations should be addressed using the principle of “defense in depth” in security infrastructure designs.

              Next Post
              top 100 high tech products 2005 3035

              Top 100 High-Tech Products 2005

              after a simple new computer to unexpected 3036

              New computer virus: simpler than expected?

              image security 3038

              Image-based Security

              Leave a Reply Cancel reply

              Your email address will not be published. Required fields are marked *

              FEATURED POST

              the mystery of the mummified woman misidentified as an egyptian pharaoh 129359

              The Mystery of the Mummy of the Woman Mistaken for the Pharaoh of Egypt

              space monsters in mythology first appearance 129358

              Cosmic Monster ‘in Legend’ Appears for the First Time

              the most dangerous coastline in the world haunting the dreams of mangrove forests 108247

              The world’s most dangerous strait – The haunting toll measured in sailors’ lives

              10 amazing natural phenomena that challenge science 60818

              23 Mysterious Natural Phenomena That Challenge Science

              TRENDING

              the truth about the 300 year old swan raising in siberia 137566
              Archaeology

              The truth about the 2,300-year-old stuffed swan in Siberia

              notes on the real dragon in history 48627
              Scientific Discoveries

              Records of the “Real” Dragons in History

              nguoi ai cap co dai 650
              Scientific Discoveries

              What Race Are the Egyptians Ultimately? Why Are They Different from Today’s Africans?

              vegetable type is nutritious it is also a medicine for health 130194
              Lifestyle

              A Type of Herb That Is Both a Spice and a “Precious Medicine” for Health

              EDITOR PICK'S

              What Race Are the Egyptians Ultimately? Why Are They Different from Today’s Africans?

              Why is sea ice pure like freshwater while the ocean is salty?

              Why is Israel considered the smallest superpower in the world?

              The truth about the 2,300-year-old stuffed swan in Siberia

              NASA reveals the reason why the entire Starlink satellite “fleet” was dropped

              17 Causes of Throat Tightness and Belching

              14 Most Powerful Military Forces in Ancient World History

              Newsletter

              THE MOST IMPORTANT WORLD NEWS AND EVENTS OF THE DAY

              Subscribe to our mailing list to receives daily updates direct to your inbox!

              Category

              • 1001 Mysteries
              • AI – Artificial Intelligence
              • Aliens & UFOs
              • Animal World
              • Antibiotic Resistance
              • Archaeology
              • Bacteria & Insects
              • Biology
              • Biotechnology
              • Climate & Weather

              Site Link

              • Log in
              • Entries feed
              • Comments feed
              • WordPress.org

              About Us

              At Scimyst, we uncover the wonders of science, history, and culture. From ancient mysteries to modern innovations, our stories inspire curiosity and connect you to the fascinating world around us. Explore the unknown with us!

              • About
              • Advertise
              • Privacy & Policy
              • Contact

              © 2025 Scimyst - Your gateway to the wonders of science and culture

              No Result
              View All Result
              • Home
              • Discoveries
                • 1001 Mysteries
                • Aliens & UFOs
                • Animal World
                • Archaeology
                • Biology
                  • Bacteria & Insects
                  • Biotechnology
                  • Plants
                • Doomsday
                • Famous Landmarks
                • History
                  • This Day in History
                • Military Science
                • Mars Exploration
                • Oceanography
                • Science Q&A
                • Science Quiz
                • Scientific Discoveries
                • Space Science
                • Why
                • World Figures
                • World Wonders
                  • Cultural Heritage
                  • Vietnamese Heritage
              • Technology
                • AI – Artificial Intelligence
                • Computer Science
                • New Technology
                  • Self-Driving Cars
                • Scientific Inventions
              • Lifestyle
                • Cancer
                • Environment
                  • Climate & Weather
                  • Disasters
                  • Latest Storm Updates
                  • Nature
                  • Solutions
                • Medicine & Health
                  • Antibiotic Resistance
                  • Common Illnesses
                  • Dengue Fever
                  • Family Medicine Cabinet
                  • Food Safety
                  • Health
                  • Influenza Outbreak
                • Scientific Applications
              • Events
                • Science Events
                • Science Stories
                • Scientific Projects
              • Entertainment
                • Photo Library
                • Videos

              © 2025 Scimyst - Your gateway to the wonders of science and culture