{"id":7593,"date":"2018-10-16T12:30:13","date_gmt":"2018-10-16T07:00:13","guid":{"rendered":"http:\/\/innoroo.com\/blog\/?p=7593"},"modified":"2018-10-14T13:10:51","modified_gmt":"2018-10-14T07:40:51","slug":"vulnerability-management-glossary","status":"publish","type":"post","link":"https:\/\/innoroo.com\/blog\/2018\/10\/16\/vulnerability-management-glossary\/","title":{"rendered":"Vulnerability management | Glossary"},"content":{"rendered":"<p><b>Definition:<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Vulnerability management may be a pro-active approach to managing network security through reducing the likelihood that flaws in code or style compromise the security of an endpoint or network.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Vulnerability management processes include:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Checking for vulnerabilities: This process should include regular network scanning, firewall work, penetration testing or use of an automatic tool sort of a vulnerability scanner.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Identifying vulnerabilities: This involves analyzing network scans and pen take a look at results, firewall logs or vulnerability scan results to seek out anomalies that recommend a malware attack or different malicious event has taken advantage of a security vulnerability, or may probably do so.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Verifying vulnerabilities: This process includes ascertaining whether or not the known vulnerabilities may really be exploited on servers, applications, networks or different systems. This also includes classifying the severity of a vulnerability and also the level of risk it presents to the organization.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Mitigating vulnerabilities: this can be the method of determining a way to stop vulnerabilities from being exploited before a patch is accessible, or within the event that there&#8217;s no patch. It will involve taking the affected a part of the system off-line (if it&#8217;s non-critical), or numerous different work-arounds.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Patching vulnerabilities: this can be the process of obtaining patches &#8212; typically from the vendors of the affected software or hardware &#8212; and applying them to any or all the affected areas in an exceedingly timely approach. this can be sometimes an automated process, through with patch management tools. This step also includes patch testing.<\/span><\/p>\n<p><a style=\"font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, Oxygen-Sans, Ubuntu, Cantarell, 'Helvetica Neue', sans-serif;\" href=\"http:\/\/www.innovationroots.com\"><b>Click here<\/b><\/a><span style=\"font-weight: 400;\"> to get such more insights<\/span><\/p>\n<p><b>Further Reading:<\/b><\/p>\n<p><b>Book: <\/b><span style=\"font-weight: 400;\">Testing Practitioner Hanbook by Renu Rajani. <\/span><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Definition: Vulnerability management may be a pro-active approach to managing network security through reducing the likelihood that flaws in code or style compromise the security of an endpoint or network. Vulnerability management processes include: Checking for vulnerabilities: This process should include regular network scanning, firewall work, penetration testing or use of an automatic tool sort [&hellip;]<\/p>\n","protected":false},"author":13,"featured_media":7594,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false},"version":2}},"categories":[102],"tags":[105,1310,1378,1379],"class_list":["post-7593","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-glossary","tag-glossary","tag-renu-rajani","tag-testing-practitioner-hanbook","tag-vulnerability-management"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/innoroo.com\/blog\/wp-content\/uploads\/2018\/10\/Vulnerability-Management.png?fit=3125%2C1709&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p8Rui8-1Yt","jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/innoroo.com\/blog\/wp-json\/wp\/v2\/posts\/7593","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/innoroo.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/innoroo.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/innoroo.com\/blog\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/innoroo.com\/blog\/wp-json\/wp\/v2\/comments?post=7593"}],"version-history":[{"count":2,"href":"https:\/\/innoroo.com\/blog\/wp-json\/wp\/v2\/posts\/7593\/revisions"}],"predecessor-version":[{"id":7601,"href":"https:\/\/innoroo.com\/blog\/wp-json\/wp\/v2\/posts\/7593\/revisions\/7601"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/innoroo.com\/blog\/wp-json\/wp\/v2\/media\/7594"}],"wp:attachment":[{"href":"https:\/\/innoroo.com\/blog\/wp-json\/wp\/v2\/media?parent=7593"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/innoroo.com\/blog\/wp-json\/wp\/v2\/categories?post=7593"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/innoroo.com\/blog\/wp-json\/wp\/v2\/tags?post=7593"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}