Software Vulnerabilities and it's impact on the CIA

Vulnerable software, application or technology is big business for cyber criminals. Identifying vulnerabilities early and knowing common pitfalls to avoid can make a big difference to the resilience of your applications.

Vulnerabilities are defects, weaknesses, in an application, system or technology that could be exploited to affect the confidentiality, integrity and availability of the application, system or technology, its users and its owners. In Cyber security these vulnerabilities pose several risks to organisations and or end-Users. We calculate risks based on 3 principles - vulnerability, likelihood and impact.

Vulnerabilities are weaknesses found within a system or technology, likelihood are chances that malicious actors could leverage the vulnerabilities for malicious exploits, Impacts are the level of damages and losses which would be incurred as a result of such exploitation.

Attackers rarely focus on the technology, technology to them is just a route to their real objective and that objective is fueled by motivation. Attackers objective could be financial, political, egotistical or personal. Each of these objectives has a different outcome when an attack comes to fruition.

Truth is, all software or technology are prone to vulnerabilities, if not immediate, it could come overtime. Understanding motivation helps us understand attackers' behavior on vulnerabilities and overall, gives us more picture on how we can better secure the technologies we develop.

To safeguard our users, data, and systems from danger, we must prioritize application security. However, as the speed of our development processes rises, so does the challenge of securing our applications. Security has evolved into a difficult area that will require a new strategy in order to succeed as opposed to the previous approach when security was the purview of specialists who worked independently from our development teams.