Archive

January 11, 2021

Browsing

When it comes to security vulnerability, it can be an error, bug, fault, flaw, or weakness in the software design, architecture, code, or any implication that can be easily exploited by cyber attackers. When a software fault, error, weakness, etc. in any software application, design, etc. is left unattained, it can lead to security vulnerabilities or cyber-attacks. There are 3 major types of security vulnerabilities that are given below, based on their nature of weakness:

  1. Porous defense vulnerabilities- This is one of the most common security vulnerabilities one can come across in the given software. In the list of 25 security vulnerabilities, 11 of them will involve porous defense vulnerability. There are many defensive techniques available such as encryption, authorization, and authentication. These techniques are useful when applied and used correctly but, when these are misused, abused, or used incorrectly they can lead to security vulnerabilities. The lack of these basic defensive techniques of missing encryption, authorization, and authentication can lead to major cyber threats.
  2. Vulnerabilities involving insecure interaction between components- Even though the insecure interaction between components category is not very common among security vulnerability, it’s a quite dangerous one. One can say, it is one of the least wanted software errors or vulnerability by all. It involves major cyber threats like SQL Injection, Cross-Site Scripting, and Open Redirect. 
  3. Risky resource management vulnerabilities- In a basic sense, resource management include creating, using, transferring, and destroying system resources such as memory. Proper and secure management is necessary for effective and safe application defense. The different types of risky resource management security vulnerabilities are related to the ways that the software mismanages the resources. The security vulnerabilities in these categories range from simple Buffer Overflow and Path Traversal to more serious and complicated issues like Inclusion of Functionality from Untrusted Control Sphere and Use of Potentially Dangerous Functions. 

All these types of security vulnerabilities have one thing in common. They are related to how the data is sent and received between separate programs, threads, modules, processes, components, and systems. To avoid and defend these vulnerabilities, there are two important strategies:

  • You must be thorough with what inputs you are using and make sure that it comes from a good source.
  • You must be well aware and make sure to use those inputs properly for their intended purposes.

Hence, it’s necessary to know about these security vulnerabilities and take the necessary steps to protect your system.