Scimyst
Subscribe
  • Home
  • Discoveries
    • All
    • 1001 Mysteries
    • Aliens & UFOs
    • Animal World
    • Archaeology
    • Biology
    • Doomsday
    • Famous Landmarks
    • History
    • Mars Exploration
    • Military Science
    • Oceanography
    • Science Q&A
    • Scientific Discoveries
    • Space Science
    • Why
    • World Figures
    • World Wonders
    thanh pho trang 650

    The Lost City of 500 Years Containing Flesh-Eating Parasites

    creating the worlds first plasma lamp not using a wire just throw it away 133669

    Creating the world’s most durable plasma lamp that doesn’t “take a break” after a few days of use

    which country suffers the most natural disasters in the world every year 136695

    Which country suffers the most natural disasters in the world, “experiencing” the most super typhoons each year?

    strange spc exoplanet

    10 Most Strange Things of the Universe

    thuan tay trai 650

    Left-Handed People and 16 “Shocking” Facts

    cham do ben khoe mieng 650

    The Secret of the Two Red Dots at the Corner of the Mouth of the Tang Dynasty Concubine

    tinh van con cua 650

    Revealing Unseen Images of the Crab Nebula through the James Webb Space Telescope

    cau hon o phap 650

    Banning Bathing, Forcing Tears, and Strange Wedding Customs Around the World

    isaac Newton1

    10 Famous Inventions of Isaac Newton

  • Events
    • All
    • Science Stories
    • Scientific Projects

    Tonight announces the Ig Nobel Prize winners

    frog

    Frog Wins Ig Nobel Prize 2005

    canhcutIg

    Life is Not Lacking in Quirks

    Nobel Prize in Medicine 2005: A Modern Fairy Tale

    10 Weird Inventions Awarded the Ig Nobel Prize 2005

    nobelKT

    Why Did They Win the Nobel Prize in Economics?

    giaydientu

    “Electronic Paper” Set to Appear on the Market

    Development of Science and Technology in the South Central Coast and Central Highlands Provinces

    a russian scientist loves vietnam 1659

    A Russian Scientist Who Loves Vietnam

  • Lifestyle
    • All
    • Environment
    • Medicine & Health
    tdnong

    Global warming may be the cause of major storms

    traxanh1

    Green tea has effects against dementia

    Discovery of Cancer-Preventing Genes in the Human Body

    Khachdulich Indonesia

    Avian influenza harms tourism more than terrorism

    nao

    Lying – A Disease of People with Brain Defects

    cafe

    Coffee May Prevent Cancer

    tebaocum

    Recreating the ‘Death’ Flu Virus of 1918

    Indo ban

    The whole world unites to fight avian influenza

    HIV aids

    The Mystery of AIDS Epidemic

  • Technology
    • All
    • AI - Artificial Intelligence
    • Computer Science
    • New Technology
    • Scientific Inventions
    top apps explore space solar system on pc 98000

    Top Applications for Exploring the Universe and Solar System on PC

    vai dien tu 650

    Soon there will be data-transmitting clothing

    sua loi khong vao dc coc coc 650

    Why can’t Cốc Cốc download videos to the computer?

    may tinh cu 1

    17 Things You Can Do with an Old Computer

    play free games super fun on android devices 54708

    Play Extremely Fun Free Games on Android Devices

    top 10 best weather apps on android 98127

    Top 10 Best Astronomy Apps on Android

    how to charge iphone properly 122474

    How to Charge an iPhone the Right Way

    canh tay robot 650

    Robot system helps neutralize mines

    trang trai noi o rotterdam 650

    Modern Cities Combining Gardens and Cattle Farms

  • Cultural Heritage
    ai cap 650

    The Ruins of Memphis & the Pyramid Complex from Giza to Dahshur – Egypt

    khao co 650

    Prehistoric Archaeological Sites in the Dordogne Valley and Caves in the Vézère Valley – France

    baroque churches philippines 67188

    Baroque Churches – Philippines

    mont saint michel france 67265

    Mont Saint Michel Island – France

    acropolis bracelet in athens greece 67621

    Acropolis Fortress in Athens – Greece

    language mo tan thuy hoang china 67087

    Tomb of Qin Shi Huang – China

    historical city ayutthaya 67804

    Historical City of Ayutthaya

    historical city ayutthaya 67804 2

    Historic City of Ayutthaya

    mesa verde national park 67201

    Mesa Verde National Park – United States of America

  • Entertainment
    • All
    • Photo Library
    • Videos

    Honesty

    Telephone

    Advanced Technology

    Terminal Illness

    Allergy

    Love Like Mars

    Super Definition

    Coi Sách

    Selling Candy

No Result
View All Result
Scimyst
  • Home
  • Discoveries
    • All
    • 1001 Mysteries
    • Aliens & UFOs
    • Animal World
    • Archaeology
    • Biology
    • Doomsday
    • Famous Landmarks
    • History
    • Mars Exploration
    • Military Science
    • Oceanography
    • Science Q&A
    • Scientific Discoveries
    • Space Science
    • Why
    • World Figures
    • World Wonders
    thanh pho trang 650

    The Lost City of 500 Years Containing Flesh-Eating Parasites

    creating the worlds first plasma lamp not using a wire just throw it away 133669

    Creating the world’s most durable plasma lamp that doesn’t “take a break” after a few days of use

    which country suffers the most natural disasters in the world every year 136695

    Which country suffers the most natural disasters in the world, “experiencing” the most super typhoons each year?

    strange spc exoplanet

    10 Most Strange Things of the Universe

    thuan tay trai 650

    Left-Handed People and 16 “Shocking” Facts

    cham do ben khoe mieng 650

    The Secret of the Two Red Dots at the Corner of the Mouth of the Tang Dynasty Concubine

    tinh van con cua 650

    Revealing Unseen Images of the Crab Nebula through the James Webb Space Telescope

    cau hon o phap 650

    Banning Bathing, Forcing Tears, and Strange Wedding Customs Around the World

    isaac Newton1

    10 Famous Inventions of Isaac Newton

  • Events
    • All
    • Science Stories
    • Scientific Projects

    Tonight announces the Ig Nobel Prize winners

    frog

    Frog Wins Ig Nobel Prize 2005

    canhcutIg

    Life is Not Lacking in Quirks

    Nobel Prize in Medicine 2005: A Modern Fairy Tale

    10 Weird Inventions Awarded the Ig Nobel Prize 2005

    nobelKT

    Why Did They Win the Nobel Prize in Economics?

    giaydientu

    “Electronic Paper” Set to Appear on the Market

    Development of Science and Technology in the South Central Coast and Central Highlands Provinces

    a russian scientist loves vietnam 1659

    A Russian Scientist Who Loves Vietnam

  • Lifestyle
    • All
    • Environment
    • Medicine & Health
    tdnong

    Global warming may be the cause of major storms

    traxanh1

    Green tea has effects against dementia

    Discovery of Cancer-Preventing Genes in the Human Body

    Khachdulich Indonesia

    Avian influenza harms tourism more than terrorism

    nao

    Lying – A Disease of People with Brain Defects

    cafe

    Coffee May Prevent Cancer

    tebaocum

    Recreating the ‘Death’ Flu Virus of 1918

    Indo ban

    The whole world unites to fight avian influenza

    HIV aids

    The Mystery of AIDS Epidemic

  • Technology
    • All
    • AI - Artificial Intelligence
    • Computer Science
    • New Technology
    • Scientific Inventions
    top apps explore space solar system on pc 98000

    Top Applications for Exploring the Universe and Solar System on PC

    vai dien tu 650

    Soon there will be data-transmitting clothing

    sua loi khong vao dc coc coc 650

    Why can’t Cốc Cốc download videos to the computer?

    may tinh cu 1

    17 Things You Can Do with an Old Computer

    play free games super fun on android devices 54708

    Play Extremely Fun Free Games on Android Devices

    top 10 best weather apps on android 98127

    Top 10 Best Astronomy Apps on Android

    how to charge iphone properly 122474

    How to Charge an iPhone the Right Way

    canh tay robot 650

    Robot system helps neutralize mines

    trang trai noi o rotterdam 650

    Modern Cities Combining Gardens and Cattle Farms

  • Cultural Heritage
    ai cap 650

    The Ruins of Memphis & the Pyramid Complex from Giza to Dahshur – Egypt

    khao co 650

    Prehistoric Archaeological Sites in the Dordogne Valley and Caves in the Vézère Valley – France

    baroque churches philippines 67188

    Baroque Churches – Philippines

    mont saint michel france 67265

    Mont Saint Michel Island – France

    acropolis bracelet in athens greece 67621

    Acropolis Fortress in Athens – Greece

    language mo tan thuy hoang china 67087

    Tomb of Qin Shi Huang – China

    historical city ayutthaya 67804

    Historical City of Ayutthaya

    historical city ayutthaya 67804 2

    Historic City of Ayutthaya

    mesa verde national park 67201

    Mesa Verde National Park – United States of America

  • Entertainment
    • All
    • Photo Library
    • Videos

    Honesty

    Telephone

    Advanced Technology

    Terminal Illness

    Allergy

    Love Like Mars

    Super Definition

    Coi Sách

    Selling Candy

No Result
View All Result
Scimyst
No Result
View All Result
Home Technology Computer Science

5 Common Mistakes in Vulnerability Management

by Sci
January 23, 2006
in Computer Science
0
Share on FacebookShare on Twitter

securityIn the eyes of some, managing vulnerabilities is considered one of the specialized security management activities. Others believe that it is merely a necessary process that Microsoft must undertake to release monthly updates. Additionally, many view it as just a “common marketing term” used by business professionals.

Through the following article, we aim to highlight some common mistakes that organizations should pay attention to in order to achieve excellence in vulnerability management from both technological and procedural perspectives.

1. Scanning without taking any action

The first common mistake is performing scans to identify security vulnerabilities but failing to take any responsive actions based on the results obtained. Security scanning and vulnerability detection experts have become mere “checklists” in many organizations. Vulnerability scanning technology has indeed seen significant advancements in recent years, evidenced by improvements in accuracy, speed, and safety of the tools used.

However, modern commercial tools or open-source scanners still suffer from a problem similar to that of Intrusion Detection Systems (IDS). First, these tools generate excessive alerts for various reasons, making them too noisy. Furthermore, they do not inform you about how to address the generated security alerts, much like IDS do not tell you which specific intrusion alert to focus on.

Thus, vulnerability management is not merely about scanning and detecting; what is crucial is the actions taken after performing the scanning process. This includes asset inventory, prioritization, and researching remediation activities, as well as practical actions such as patching, reconfiguring, or securing systems.

2. Considering patching vulnerabilities as equivalent to vulnerability management

In reality, patching vulnerabilities is merely a method of repairing known security flaws. Some industry experts even suggest that vulnerability management is as simple as just fixing all the troublesome issues.

However, many security vulnerabilities cannot be simply patched by updating to the latest version of applications; they often require changes or reconfiguration of various system parameters. Therefore, vulnerability management necessitates prioritizing and intelligently remediating identified vulnerabilities using patches or other methods.

Thus, if you are busy every minute on the third day of the month but do not take any action to eliminate security vulnerabilities in your organization for the remaining 29 days, you are not genuinely engaging in vulnerability management.

3. Assuming that vulnerability management is solely a technical issue

If you believe that vulnerability management is simply a technical issue, that is quite surprising. To achieve effectiveness in this task, it requires attention to improving policies and processes. In fact, focusing on processes and the “soft” aspects of vulnerability management often yields more benefits than a high-tech patching system. Many weaknesses still exist in policies and IT infrastructure. We will not address weaknesses in policies here, as these can sometimes be considered vulnerabilities. For example, if you do not enforce a policy requiring passwords of a certain length, that is a weakness or vulnerability in your policy, which scanning and detection experts may not uncover, resulting in no solutions for the issue.

Therefore, weak passwords, lack of awareness regarding data security, and absence of workstation configuration standards can inflict more damage on your security posture and increase the risks you face.

According to analysts at Gartner: “The vulnerability management process should include tasks such as defining policies, identifying environmental boundaries, prioritizing, protecting, mitigating losses, as well as monitoring and maintaining.”

Thus, according to this understanding, the vulnerability management process should begin with a document defining policies regarding issues such as organizational resources – applications or systems – along with user considerations. Such a document, along with other security processes, should define the scope of vulnerability management and the “acceptable” stages of IT resource maturity.

4. Assessing a vulnerability without considering the bigger picture

Individuals attempting to adhere to a logical vulnerability management process often commit this common error. When facing serious challenges in prioritizing the remediation of vulnerabilities, they frequently overlook the dangerous aspects of that prioritization. For instance, they may try to assess the importance of vulnerabilities based solely on the vulnerabilities themselves without considering the overall security threat landscape and the business roles of the affected systems.

The only way to avoid this fourth common mistake is to use the formula Risk = Threat x Vulnerability x Value and apply the results of this calculation to decide which vulnerabilities to prioritize for remediation.

However, to establish a smart prioritization of vulnerability remediation, you must consider other factors in your IT environment as well as external factors. These factors include:

– The severity of vulnerabilities
– Information related to security threats
– Business value and information about targeted systems

Recently, a new standard for classifying the severity of vulnerabilities has been introduced to help organizations prioritize which vulnerabilities need to be fixed. The Common Vulnerability Scoring System (CVSS) evaluates various characteristics of vulnerabilities such as priority, exploitability, and impact. CVSS is expected to provide a unified method for scoring vulnerability assessments and will soon be adopted by many security information providers. However, CVSS data still requires updates to include information on business value and threats.

Business information is crucial in prioritizing vulnerabilities because it can integrate technical threats and data vulnerabilities into a business function. Different organizations vary in every aspect, thus possessing different critical assets and applications. Attacks affecting some organizations can lead to bankruptcy, while for others, it might only mean a temporary disruption. However, in real life, the situation is not that straightforward, and lower-priority vulnerabilities can sometimes pave the way for exploiting more critical vulnerabilities.

5. Failing to adequately prepare for the unknown – Zero-day security vulnerabilities

The fifth common mistake is related to “zero-day exploits.” This type of vulnerability is a significant concern for many security managers. There is still a lot of confusion about what constitutes a “zero-day exploit.” Simply put, it is the exploitation of a vulnerability that has not been previously disclosed. Therefore, even if you have patched all known vulnerabilities, you still need to prepare for attacks by adversaries utilizing previously unknown vulnerabilities.

What should you do? In addition to a sensitive vulnerability management program, you should have a comprehensive set of tasks in place that can protect you from “zero-day exploits” and carefully monitor server security. Additionally, you need to ensure that all response plans are ready in case of an attack. Such situations should be addressed using the principle of “defense in depth” in security infrastructure designs.

Next Post
top 100 high tech products 2005 3035

Top 100 High-Tech Products 2005

after a simple new computer to unexpected 3036

New computer virus: simpler than expected?

image security 3038

Image-based Security

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

FEATURED POST

the mystery of the mummified woman misidentified as an egyptian pharaoh 129359

The Mystery of the Mummy of the Woman Mistaken for the Pharaoh of Egypt

space monsters in mythology first appearance 129358

Cosmic Monster ‘in Legend’ Appears for the First Time

the most dangerous coastline in the world haunting the dreams of mangrove forests 108247

The world’s most dangerous strait – The haunting toll measured in sailors’ lives

10 amazing natural phenomena that challenge science 60818

23 Mysterious Natural Phenomena That Challenge Science

TRENDING

the shirt that helps users hide security camera 126214
Lifestyle

The shirt that helps users hide from security cameras

no cave no peak excluding china leaves the world amazed when building a bridge like a dragon flying over the river 136956
Scientific Discoveries

No Tunnels, No Supports: China Stuns the World with a Bridge that Floats like Silk on the River

10 amazing natural phenomena that challenge science 60818
1001 Mysteries

23 Mysterious Natural Phenomena That Challenge Science

nguoi ai cap co dai 650
Scientific Discoveries

What Race Are the Egyptians Ultimately? Why Are They Different from Today’s Africans?

EDITOR PICK'S

No Tunnels, No Supports: China Stuns the World with a Bridge that Floats like Silk on the River

What Race Are the Egyptians Ultimately? Why Are They Different from Today’s Africans?

The shirt that helps users hide from security cameras

23 Mysterious Natural Phenomena That Challenge Science

20 Famous Inventions of Ancient China

14 Most Powerful Military Forces in Ancient World History

How many planets are there in the universe?

Newsletter

THE MOST IMPORTANT WORLD NEWS AND EVENTS OF THE DAY

Subscribe to our mailing list to receives daily updates direct to your inbox!

Category

  • 1001 Mysteries
  • AI – Artificial Intelligence
  • Aliens & UFOs
  • Animal World
  • Antibiotic Resistance
  • Archaeology
  • Bacteria & Insects
  • Biology
  • Biotechnology
  • Climate & Weather

Site Link

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

About Us

At Scimyst, we uncover the wonders of science, history, and culture. From ancient mysteries to modern innovations, our stories inspire curiosity and connect you to the fascinating world around us. Explore the unknown with us!

  • About
  • Advertise
  • Privacy & Policy
  • Contact

© 2025 Scimyst - Your gateway to the wonders of science and culture

No Result
View All Result
  • Home
  • Discoveries
    • 1001 Mysteries
    • Aliens & UFOs
    • Animal World
    • Archaeology
    • Biology
      • Bacteria & Insects
      • Biotechnology
      • Plants
    • Doomsday
    • Famous Landmarks
    • History
      • This Day in History
    • Military Science
    • Mars Exploration
    • Oceanography
    • Science Q&A
    • Science Quiz
    • Scientific Discoveries
    • Space Science
    • Why
    • World Figures
    • World Wonders
      • Cultural Heritage
      • Vietnamese Heritage
  • Technology
    • AI – Artificial Intelligence
    • Computer Science
    • New Technology
      • Self-Driving Cars
    • Scientific Inventions
  • Lifestyle
    • Cancer
    • Environment
      • Climate & Weather
      • Disasters
      • Latest Storm Updates
      • Nature
      • Solutions
    • Medicine & Health
      • Antibiotic Resistance
      • Common Illnesses
      • Dengue Fever
      • Family Medicine Cabinet
      • Food Safety
      • Health
      • Influenza Outbreak
    • Scientific Applications
  • Events
    • Science Events
    • Science Stories
    • Scientific Projects
  • Entertainment
    • Photo Library
    • Videos

© 2025 Scimyst - Your gateway to the wonders of science and culture