- Cybersecurity Threats,Malware Trends,and Strategies
- Tim Rains
- 419字
- 2021-06-30 14:49:14
Chapter summary
Hopefully, I didn't blind you with too much science in this chapter—there were a lot of numbers to digest! Allow me to recap some of the key take-aways for this chapter.
Risk is a combination of probability and impact. The Common Vulnerability Scoring System (CVSS) is used to estimate the risk for each vulnerability (CVE) in the National Vulnerability Database (NVD). This data should be used to inform your vulnerability management program. Using vendors who have been successful at reducing the number of vulnerabilities in their products can potentially reduce the time, effort, and costs related to your vulnerability management program. If you choose vendors who have also invested in reducing attackers' return on investment by making the exploitation of vulnerabilities in their products hard or impossible, you'll also be reducing your risk and costs.
Of the vendors examined in this chapter, only Apple met the criteria of our vulnerability improvement framework by reducing the number of vulnerabilities in their products, reducing the severity of vulnerabilities in their products, and reducing the number of low access complexity vulnerabilities (those with the highest risk) over the 5 years studied. The operating systems that I examined that achieved the objectives of our vulnerability improvement framework over a 3-year period were Linux Kernel and Apple macOS. The web browsers I examined with the best vulnerability management track record between 2016 and 2018 included Apple Safari, Google Chrome, and Microsoft Internet Explorer. The way vulnerabilities were managed in these browsers during these 3 years reduced the risk to their users.
Please keep in mind that the data used for these comparisons has many biases and is not complete or completely accurate. But you can do your own CVE research and use the informal "vulnerability improvement framework" I've provided.
Vulnerability management teams that scan everything, every day, provide the best visibility for their organizations to manage risk. Data from vulnerability management programs provide CISOs with some of the data they need to manage the performance of their security programs and steer future investments into the programs.
In the next chapter, we are going to dive into malware infection data from hundreds of millions of systems around the world to examine how the threat landscape has evolved over the years. Did you know that socio-economic factors, such as GDP, are related to regional malware infection rates? We are going to look at this as well. Additionally, I'm going to provide you with some tips and best practices for consuming threat intelligence.
- 云原生安全:攻防實踐與體系構(gòu)建
- Kali Linux Social Engineering
- Penetration Testing with Perl
- 數(shù)據(jù)安全實踐指南
- 從0到1:CTFer成長之路
- 網(wǎng)絡(luò)安全與攻防入門很輕松(實戰(zhàn)超值版)
- 白話零信任
- 企業(yè)數(shù)據(jù)安全防護指南
- 云計算安全:關(guān)鍵技術(shù)、原理及應(yīng)用
- 黑客攻防與電腦安全從新手到高手(超值版)
- Practical Internet of Things Security
- 從實踐中學(xué)習(xí)Nmap滲透測試
- Metasploit 5.0 for Beginners
- CTF網(wǎng)絡(luò)安全競賽入門教程
- 大數(shù)據(jù)安全治理與防范:反欺詐體系建設(shè)