Vulnerabilities
Vulnerabilities are weaknesses or flaws in a system, process, or design that could be exploited to cause harm. In information security, a vulnerability is a gap in confidentiality, integrity, or availability that an attacker could exploit to gain unauthorized access, modify data, or disrupt services. Vulnerabilities can exist in software, hardware, networks, and organizational practices.
Common categories include technical vulnerabilities such as software bugs, insecure defaults, misconfigurations, and weak cryptography; architectural
Vulnerability discovery is typically performed by researchers, auditors, or automated scanning tools. After discovery, vulnerabilities are
Vulnerability management follows a lifecycle: identification, risk assessment, remediation through patches or configuration changes, mitigation via
Mitigation measures include applying software updates, enforcing least privilege, network segmentation, input validation, secure coding practices,
Vulnerabilities are central to risk assessment, compliance, and resilience. They are addressed by standards and frameworks