Points to consider for Risk Assesment of Vulnerabilities

The list of items that are needed in order to assess the risk posed by the vulnerability to the corp network.
There are three factors for assessing the Risk –

  1. Likelyhood – the threat might realize in the company network
  2. Consequence – impact of the realized threat on the individual compromised/vulnerable host
  3. Impact – Overall impact of the realized threat on the company in terms of $$


  • Is the code/exploit available, published?    
  • Remotely exploitable?                
  • User interaction Required?                
  • Which version of Application is vulnerable?



  • Percentage of deployment in the company ?



  • What is the result of the vulnerability?
  • Does it run with system privilege or logged on user privilege?
  • Available Workaround?




About wikihead

A Seeker. Information Security Professional, Pursuing Life with Ayurveda.
This entry was posted in Articles, Notes, Uncategorized and tagged , . Bookmark the permalink.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s