So you have discovered a weakness in your system? What is the right course of action you may ask? We will answer this in detail in this video course “Vulnerability analysis” where you will first learn how to deal with weaknesses and determine risk value.
First, we will define vulnerability analysis and introduce what the continuous cybersecurity activities process looks like and where does vulnerability analysis fit in the process. Then, we will briefly provide an overview and a the step-by-step process of vulnerability analysis.
After that, we will explain the two approaches for laying out how a vulnerability eventually leads to a threat scenario by identifying an attack path, those are of course as mentioned in previous videos the top-down approach and the bottom-up approach. Finally, we get into vulnerability treatment, where we point out the different reactions to vulnerability either retention or treatment.