Forums
New posts
Search forums
News
Security News
Technology News
Giveaways
Giveaways, Promotions and Contests
Discounts & Deals
Reviews
Users Reviews
Video Reviews
Support
Windows Malware Removal Help & Support
Inactive Support Threads
Mac Malware Removal Help & Support
Mobile Malware Removal Help & Support
Blog
Log in
Register
What's new
Search
Search titles only
By:
Search titles only
By:
Reply to thread
Menu
Install the app
Install
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Forums
Security
General Security Discussions
Contemplating Vulnerability Monitoring
Message
<blockquote data-quote="lunarlander" data-source="post: 811988" data-attributes="member: 66581"><p>Hacking for mischievous 'fun', hacking for identity theft, hacking to plant bots, hacking for stealing biz intelligence, and hacking to stalk are all common. The attacker can use various Methods: phishing, delivering malware through email attachments, drive-by downloads, and other more direct attacks like cellphone hacking. And all the methods rests on some part of your Windows, devices or network having some vulnerability. To prevent disruptions to CIA ( confidentiality, integrity and availability ) which we take for granted, one has to know your vulnerabilities and then put up defenses accordingly.</p><p></p><p>Risk evaluations should consider the cost of the device/PC, the time and cost it takes to recover from an attack, and the disruptions to CIA. Risk evaluation is not gut based feelings that one is a Mr. Nobody Important or that one is not a biz. Funds and time should be allocated for proper protection. Vulnerability monitoring is just a more pointed way to decide on what protection to get, instead of just following popular concepts like 'must get an antivirus program'. Commonly we perform risk evaluations when we do things like buying a good door lock and installing a smoke alarm. No reason why we shouldn't do it for our IT possessions, and our personal data, which is a very important part of modern living.</p></blockquote><p></p>
[QUOTE="lunarlander, post: 811988, member: 66581"] Hacking for mischievous 'fun', hacking for identity theft, hacking to plant bots, hacking for stealing biz intelligence, and hacking to stalk are all common. The attacker can use various Methods: phishing, delivering malware through email attachments, drive-by downloads, and other more direct attacks like cellphone hacking. And all the methods rests on some part of your Windows, devices or network having some vulnerability. To prevent disruptions to CIA ( confidentiality, integrity and availability ) which we take for granted, one has to know your vulnerabilities and then put up defenses accordingly. Risk evaluations should consider the cost of the device/PC, the time and cost it takes to recover from an attack, and the disruptions to CIA. Risk evaluation is not gut based feelings that one is a Mr. Nobody Important or that one is not a biz. Funds and time should be allocated for proper protection. Vulnerability monitoring is just a more pointed way to decide on what protection to get, instead of just following popular concepts like 'must get an antivirus program'. Commonly we perform risk evaluations when we do things like buying a good door lock and installing a smoke alarm. No reason why we shouldn't do it for our IT possessions, and our personal data, which is a very important part of modern living. [/QUOTE]
Insert quotes…
Verification
Post reply
Top