One Article Review

Accueil - L'article:
Source AlienVault.webp AlienVault Blog
Identifiant 1602635
Date de publication 2020-03-17 12:00:00 (vue: 2020-03-17 13:01:22)
Titre Exploits, vulnerabilities and threat adaptation
Texte Security, whether focused on physical, cyber, operational, or other domains, is an interesting topic that lends itself to considerable debate among practitioners.  There are, however, basic concepts and underpinnings that pervade general security theory. One of the most important, yet often misunderstood concepts are those inextricably entwined concepts of vulnerabilities and exploits.  These basic underpinnings are critical in all security domains.  What are exploits and vulnerabilities and why are they important to the study of security? First, security cannot be considered a binary concept such as: “secure” or “not secure”.  The appropriateness of any security strategy is relative to the controls implemented to address to identified risks.  One cannot say: “my house is secure”.  The measure of security is predicated upon the identified risks and the associated controls implemented to address those risks.  One can say: “My house has been secured in a manner that is commensurate with the identified risks”.  Second, security should be viewed as a function of time and resources.  Finally, security, in any domain, can never be ‘assured’ nor can there be a ‘guarantee’ of security.  The reason is simple.  Technologies change and human threats are adaptive.  According to the Department of Homeland Security’s Security Lexicon, Adaptive Threats are defined as: “…threats intentionally caused by humans.” It further states that Adaptive Threats are: “…caused by people that can change their behavior or characteristics in reaction to prevention, protection, response, and recovery measures taken.” The concept of threat adaptation is directly linked to the defense cycle.  In short, as defenses improve, threat actors change their tactics and techniques to adapt to the changing controls.  As the threat actor improves their capabilities the defensive actors necessarily have to change their own protections.  This cycle continues ad infinitum until there is a disruption. The US Department of Homeland Security (DHS) lexicon defines a vulnerability as…”…characteristic of design, location, security posture, operation, or any combination thereof, that renders an asset, system, network, or entity susceptible to disruption, destruction, or exploitation”  Expanding upon this it can be described as a susceptibility which would allow a single (or combination of) technique(s), tactic(s), or technology(ies) (exploits) to circumvent, bypass, or defeat the protection offered by the technique, tactic, or technology in place as protection (the control) against a(an) anticipated exploit(s).  Succinctly, a vulnerability is a susceptibility to a given, identified exploit. While a given vulnerability in a system may not have been yet been identified, they may exist.   Given enough time, effort, and the right tools, any security control can be circumvented.  As stated previously, security can be expressed as a function of time and resources (S=f(TR)).  It is also important to note that the concepts of exploits and vulnerabilities are inextricably entwined and mutually dependent. The common security noun “exploit” is adapted from the English verb “to exploit” which means to “use something to one’s advantage. It has been turned into a noun. An exploit is defined as something that…”
Envoyé Oui
Condensat “…threats “i “mathematical “my “not “to “torch “use ‘resources ‘threat  in  it  they ” it 000 120 1977 1997 2016 2017 a function a vulnerability able about accept according actor actors actually adapt adaptation adaptation’ adapted adaptive address adopted advance advantage advisable after against age algorithm algorithms all allow allows also among an exploit answer anticipated any anyone applying approached appropriate appropriateness are are: “…caused argument as…”…characteristic as: asset associated attack attackers attacks attempt available away back bank bars based basic beast been before behavior behavior…”  being believe below binary break breaks broken bronze brute bug burn bypass can can be cannot capabilities cause caused certified change changing characteristics circular circumvent circumvented class combination commensurate common comprehensive computer computing concept concepts concrete consider considerable considered continues control control  controls could country covered crack cracker create created critical cutting cyber cycle data debate dedicated defeat defense defenses defensive defined defines definitively department dependent des deschall described design designed destruction develop developed dhs directly discovered disruption does domain domains door door’s during effort efforts egyptian electric empire encrypted encryption endeavors english enough entity entwined envision etc even every example exist existed existing exists expected exploit exploit” exploitation”  expanding exploits expressed fact features finally first flame focus focused foot force formulating from function further gain general get given government great had hammer hardened has have heat here homeland hot hours house how however human humans ibm identified ies implement implemented important impossibility” improve improves inch include increased independent inextricably infinitum information intentionally interesting invulnerable iron itself key knowledge known later layer least lends lexicon likely linked location lock locks made manner may means measure measures mechanical mechanism melting message minutes misunderstood modern money more most mutually naturally necessarily network never new nor not note noted noun now offered often once one one’s only opened operation operational organizations other over own particular payment people person pervade physical pinnacle place platform point posited posture power practitioners predicated prevention previously probable project protect protecting protection protections protocol provide pry rainbow rated reaction readers reason recent recently recover recovery reinforce reinforced relative release relevant renders required resistant resounding resources response right risk risks risks” s=f said: same save saws say say: second seconds secure secure” secured security security’s seem semantics sensitive short should simple simply single smelted socket some someone something sound sslv2 standard stated states steel steel’s strategies strategy study succinctly such sufficient summary susceptibility susceptible system tables tactic tactics taken technique techniques technologies technology test that…”takes then theory thereof these thick those thousand threat threats through time time’ tools tools” topic torch transported trying turned ul608 unanticipated underpinnings understanding unidentified unintended unknown until upon used using vault verb version very view viewed virtually vulnerabilities vulnerability vulnerable walls was discovered way weakness websites well what whether which why will without withstand would written year years yet
Tags Vulnerability Threat
Stories
Notes ★★★★★
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: