From the course: Ethical Hacking: Vulnerability Analysis

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Solution: The Temporal metric group (new)

Solution: The Temporal metric group (new)

From the course: Ethical Hacking: Vulnerability Analysis

Start my 1-month free trial

Solution: The Temporal metric group (new)

(bright upbeat music) - [Instructor] Okay, now let's check our work. Now, the first metric is Exploit Code Maturity. Now, this represents a value as to how likely the vulnerability will be attacked. And this is based on a couple of things, the current state of techniques, availability of the code, or the level of awareness of the exploit. And sometimes there's a couple other things we want to consider. For example, the exploit might be possible but it really isn't worth exploiting, or the exploit might be possible and it is worth exploiting. The next metric is the remediation level. Now, this is an important factor for prioritization. Now, the typical vulnerability is unpatched when initially published. Now, this is a good point because we don't have any protection. The vendor might have some workarounds or hotfixes that might offer some interim remediation. But each improvement will adjust that score as to the urgency…

Contents