From the course: Ethical Hacking: Vulnerability Analysis

Unlock the full course today

Join today to access over 24,700 courses taught by industry experts.

Solution: The Temporal metric group

Solution: The Temporal metric group

(bright music) - Okay, now let's check our work. Now, the first metric is exploit code maturity. Now, this represents a value as to how likely the vulnerability will be attacked, and this is based on a couple of things, the current state of techniques, availability of the code, or the level of awareness of the exploit. And sometimes there's a couple other things we want to consider. For example, the exploit might be possible, but it really isn't worth exploiting, or the exploit might be possible and it is worth exploiting. The next metric is the remediation level. Now this is an important factor for prioritization. Now the typical vulnerability is unpatched when initially published. Now this is a good point because we don't have any protection. The vendor might have some workarounds or hot fixes that might offer some interim remediation, but each improvement will adjust that score as to the urgency decreases or as remediation becomes final. So ultimately our goal is that there is full…

Contents