- Version
- Download 9
- File Size 853.73 KB
- File Count 1
- Create Date June 27, 2023
- Last Updated June 27, 2023
A vulnerability:
Is a weakness in an IT system (OS or Application) that can be exploited by an attacker to deliver a successful attack.
An exploit:
Is a program, or piece of code, designed to find and take advantage of a security flaw or vulnerability in an application or computer system, typically for malicious purposes such as installing malware. An exploit is not malware itself, but rather it is a method used by cybercriminals to deliver malware.
Vulnerabilities VS Anomalies
Vulnerabilities are known attacks with known patterns that can be matched by IPS, web application firewall (WAF) or antivirus signatures.
Anomalies refer to unusual behavior in the network, such as higher-than-normal CPU
usage or network traffic. Anomalies must be detected and monitored (and in some cases, blocked or mitigated) because they may be symptoms of a new attack that has never been seen before
(Zero-day attack). Anomalies are detected through behavioral analysis, such as DoS policies, and protocol constraint checks.