top of page

Vulnerabilities, Threat and Risk

Writer's picture: TheTechPriyankaTheTechPriyanka

Despite the fact that Threats, Vulnerabilities, and Risks are often used interchangeably, there are specific meanings to each of these terms, which I will explain today.


Every day, you come across situations where your network device is running on x version, and this version is hitting this specific vulnerability. This is a very common question you might have encountered while dealing with your network devices.


Let's take a closer look at the terms threat, vulnerability, and risk. My first point would be to emphasize the word asset here, what do you mean by asset?





In my opinion, the asset is nothing more than what you are protecting.

A risk is the probability of something happening and the severity of it. We can put it this way: risk itself arises from threats exploiting vulnerabilities for stealing or damaging assets.

A threat such as a hacker may exist. However, if you don't have any vulnerabilities, then your risk is very low.

Hackers could exploit any weakness in the way the process works. Code or plugins that aren't updated or maintained can be as dangerous as leaving a door unlocked. As I have mentioned previously, in your day-to-day life, you will often come across this vulnerability when handling network devices. The fix may be a new firmware or patch. You could be leaving vulnerabilities wide open for hackers if you don't update your device/site regularly. If you don't replace your house's lock, even though it's old , you're essentially leaving your house vulnerable to burglars who will steal your valuables. The burglar is taking advantage of a flaw/weakness in the locker.


A bad guy, a threat agent, is now going to look into the system and see the vulnerability and consider how they can exploit it. It will give the threat agent a chance to exploit the system if the network device is not updated or running on firmware with a few vulnerabilities.


Therefore, it is crucial to remain vigilant and aware of cyber threats, as hackers may exploit even the smallest vulnerability in your system.


You must have heard people say so many times that the internet isn't safe, so I won't use it. People should be made aware of what it is and how to use the internet safely, not the other way around. For people to understand which is a scam and which is not, they should at least have basic knowledge.


The need for cybersecurity awareness arises at this point.


Different types of hackers:


Black Hat Hackers

White Hat Hackers

Grey Hat Hackers

Green Hat Hackers

Script Kiddies

State/Nation Sponsored Hackers





Black Hat Hackers


Black hat hackers are the most common hackers related to recent cybercrime news. They are malicious. Individual PCs, organizations, and bank systems are targeted by these hackers. To get access to personal, business, and financial information, they can exploit any loopholes and hack into networks.



White hat hackers


The term ethical hacker refers to cybersecurity experts who perform penetration tests and identify security loopholes in government and corporate networks. A white hat hacker's goal is to protect your system from black hat hackers and other malicious cyber criminals, so they always do everything legally and with good intentions. To put it simply, these are the right people on your side who will hack into your system legally with good intentions and help make it more secure.


Grey Hat Hacker


A white hat hacker is somewhere between a black hat hacker and a white hat hacker. Although they may not use their skills for personal gain, they may have both good and bad intentions.

A hacker who hacks into an organization and finds some vulnerabilities may leak it over the internet or inform the organization. It is not a black hat hacker as they will not use the information for personal gain, nor is it a white hat hacker as they won't be legally authorized to gain access to the organization's systems.


State/ Nation Sponsored Hackers


A state or nation's government employs these hackers to penetrate through full security to gain confidential information. A nation can deploy them to gather intelligence in the event of cyberwar. Additionally, they have unlimited budgets and extremely advanced tools at their disposal for targeting individuals, companies, and rival nations.



Hacktivist


A hacktivist is a hacker or group of anonymous (hidden/unsocialized) hackers. In order to gain attention or express their displeasure, they hack governments and organizations. Demonstrations are usually conducted by organizing rallies, and people come to the streets to garner attention. Similar groups of people are hacktivist hackers, but they gain attention by hacking websites. Hacktivist are the online version of activists.

#cisco#cisconetworking#networkengineer#networkadministration#wireless#informationsecurity#cybercrime#cybersecurity#cybersecurityawareness#frankfurt#ger

 
 
 

Recent Posts

See All

Comentarios


  • Facebook
  • LinkedIn
bottom of page