Community Platform
Interests
  • Financial Technology (FinTech)
  • JavaScript
  • jQuery
  • JSON
  • more...
This Year
420 Points
Total
1010 Points
MIS Badge

Click here
to validate the recipient

Mitigating Cybersecurity Vulnerabilities

In this course I learned an overview on how to detect cybersecurity vulnerabilities and how to mitigate them. Tools identified to help with the process included network scanners like nmap and Shodan and vulnerability assessment tools like Open vas and Qualys. A penetration test is performed using these tools to identify vulnerabilities before hackers do. Next a triage is performed which reviews and analyzes the outputs from the penetration test. Cybersecurity involves constant monitoring due to the changing nature of cybercrimes. Next, cybersecurity managers prioritize which vulnerabilities to mitigate first by analyzing the likelihood vs severity. The common vulnerabilities scoring system (CVSS) is one scoring metric that can be used. Some other metrics that can be used are time to remediation, vulnerability density, and patch coverage. Now that the vulnerabilities have been prioritized, they need to be mitigated through patch management systems or configuration management. For vulnerabilities that can’t be patched, roll out compensating controls or other security measures. Lastly, these vulnerabilities need to be reported to a senior decision maker. This report should be clear and concise on the identified vulnerabilities, their severity and impact, and how to remediate them.

I can apply this skill in my Cybersecurity capstone class and my career. These skills will help me in my assignments.

Skip to toolbar