Boundless Pages
Home
Risk Awareness
Cyber Security Risk Management
Cybersecurity Vulnerability Rating
Ease of Discovery refers to the difficulty a threat actor may encounter when attempting to identify a vulnerability. This is measured on a scale that ranges from nearly impossible to extremely easy. A rating of 1 indicates that the vulnerability is practically impossible to discover, requiring exceptional effort or resources. A rating of 3 suggests it is difficult to uncover, typically necessitating specialised skills or advanced knowledge. At a rating of 7, the vulnerability becomes relatively easy to detect with minimal expertise or effort. Finally, a rating of 9 signifies that the vulnerability can be identified using automated tools, making it highly accessible even to attackers with limited skills. This scale provides a clear framework for understanding the likelihood of discovery based on the vulnerability’s visibility.
Ease of Exploit (Vector) refers to how easily a threat actor can exploit a vulnerability once discovered. This is evaluated on a scale to reflect the level of effort required for exploitation. A rating of 1 represents a theoretical exploit, where practical exploitation is nearly impossible and may only be feasible under controlled conditions. A rating of 3 indicates that exploiting the vulnerability requires significant skill or effort. A rating of 5 signifies that the exploit is relatively easy to perform, requiring moderate expertise or resources. Finally, a rating of 9 is assigned when automated tools are readily available, making exploitation simple and accessible even to attackers with minimal skills. This scale helps assess the practicality of leveraging the vulnerability in real-world scenarios.
Awareness evaluates how widely known the vulnerability is among threat actors, providing insight into its potential exposure and risk level. A rating of 1 indicates the vulnerability is entirely unknown to threat actors, posing minimal immediate risk. A rating of 4 suggests the vulnerability is hidden, known only to a select few or through specialised knowledge. A rating of 6 means the vulnerability is more apparent and likely to be recognised by skilled individuals with moderate effort. Finally, a rating of 9 denotes that the vulnerability is public knowledge, widely accessible and potentially well-documented, significantly increasing the likelihood of exploitation. This scale helps measure the visibility and awareness of a vulnerability within the threat landscape.
Intrusion Detection Vector assesses the likelihood of an exploit being detected during or after an attack. This metric helps evaluate how effectively an organisation can respond to or mitigate the exploitation of a vulnerability. A rating of 1 indicates active detection within the application, where the exploit is immediately identified and flagged for response. A rating of 3 applies when the exploit is logged and actively reviewed, allowing for detection after the fact. A rating of 8 is assigned when the exploit is logged but not routinely reviewed, significantly delaying or reducing the chances of detection. Finally, a rating of 9 denotes that the exploit is not logged at all, making detection highly unlikely unless other security measures intervene. This scale provides a clear framework for understanding the detection capability and response readiness in the face of an exploit.
Introduction to Cybersecurity Risk
Drivers for Cybersecurity Management
Governance, Risk and Compliance
Benefits of Cyber Risk Management
Cybersecurity Strategy
EU Cyber Resilience Act
Digital Operational Resilience
DORA and IT Suppliers
ISO 27005 Risk Management
Technical and Business Impact
Risk Appetite
Security Risk Register
Cybersecurity Risk Assessment
Cybersecurity Vulnerability Risk Rating
Assessing Security Risks
Assessing Risk in Unsupported Systems
Cybersecurity Vulnerability Rating
Cybersecurity Threat Vectors
Cybersecurity Kill Chain
NCSC Cyber Assessment Framework
Plan-Do-Check-Act (PDCA) Cycle
Business Continuity Planning
Business Impact Analysis
Intrusion Detection System
Next-Generation Firewalls
More Next-Generation Firewalls
SIEM
Effective SIEM Management
Effective Incident Management
Roles and Responsibility Matrix
10 Steps of Cyber Security
10 Steps of Cyber Security P2
Vulnerability Management
Identity and Access Management
Cyber Security Risk-based Approach
Cyber Security Baseline Management
Cyber Resilience Framework
Supply Chain Risk Management
Supply Chain Risks
Incident Response
Incident Response Lessons Learned
Red Teams
Cybersecurity Training Videos
Cybersecurity Kill Chain
10 Steps to Cybersecurity
By Passing Microsoft 365 MFA