SlideShare a Scribd company logo
Vulnerability Assessments
Roger G. Johnston
Right Brain Sekurity
http://rbsekurity.com
The idea behind Vulnerability Assessments (VAs) is that we cannot prevent or test what we
haven’t envisioned.
Vulnerability Assessments (VAs) involve imaginatively thinking like the bad guys to discover
security weaknesses (i.e., “vulnerabilities”), attack scenarios, and potential countermeasures.
VAs are often confused with other security analysis techniques like threat assessments, risk
assessments, security surveys, security audits, DBT, CARVER, pen testing, “red teaming”, etc.
These other techniques may well be worth doing, but they commonly suffer from a number of
problems:
1. They aren’t as good as VAs at finding vulnerabilities, attack scenarios, and countermeasures,
often because they are focused on other things.
2. They are rarely done in an imaginative manner by creative people using critical thinking skills.
3. Unlike VAs, they don’t mimic the thought processes of the bad guys. If we want to predict
what the bad guys may do, we need to think like them!
4. These (often formalistic) methods typically suffer from the Fallacy of Precision and/or claims
of exactness, objectivity, and reproducibility that—upon close examination—are merely sham
rigor.
One of the problems is that the term “vulnerabilities” often gets hijacked so that it becomes
confused in people’s minds with threats, risks, assets that we need to protect, features of our
facility or security program, or attack scenarios. When this happens, it becomes difficult to think
and talk about the problems with our security. Sloppy terminology does have consequences!
https://www.amazon.com/dp/B08C9D73Z9

More Related Content

PDF
Vulnerability Assessment Myths
PDF
How to Think Like a Vulnerability Assessor
DOC
Adversarial Safety Analysis
PDF
Threats vs. Vulnerabilities
PDF
Focusing on the Threats to the Detriment of the Vulnerabilities
PDF
Design Reviews Versus Vulnerability Assessments for Physical Security
DOCX
Security Assurance
PDF
Understanding Information Security Assessment Types
Vulnerability Assessment Myths
How to Think Like a Vulnerability Assessor
Adversarial Safety Analysis
Threats vs. Vulnerabilities
Focusing on the Threats to the Detriment of the Vulnerabilities
Design Reviews Versus Vulnerability Assessments for Physical Security
Security Assurance
Understanding Information Security Assessment Types

Similar to Understanding Vulnerability Assessments (19)

PPTX
Introduction to FAIR - Factor Analysis of Information Risk
PPTX
Economically driven Cyber Risk Management
PDF
Relating Risk to Vulnerability
PPTX
Increasing Value Of Security Assessment Services
PPTX
Risk identification
DOCX
Explain the differences between a threat assessment- a vulnerability a.docx
PDF
The Russell Realty Group SWOT Analysis
PDF
Scenario Planning- Psychological Perspective
PDF
Artificial Intelligence – Time Bomb or The Promised Land?
PDF
Insider Threat Mitigation
PPTX
Semi-quantitative approach to risk analysis
PDF
cybersecurity-series-2019-threat-hunting.pdf
PPTX
Red Teaming and the Supply Chain
PDF
Step Into Security Webinar - Threat Assessments in Schools
PDF
Step Into Security Webinar - Threat Assessments for K-12 & University Campuses
PPT
Introduction to unconscious bias
PPTX
Управление рисками: как перестать верить в иллюзии
PDF
Root Cause Analysis versus Shallow Cause Analysis
Introduction to FAIR - Factor Analysis of Information Risk
Economically driven Cyber Risk Management
Relating Risk to Vulnerability
Increasing Value Of Security Assessment Services
Risk identification
Explain the differences between a threat assessment- a vulnerability a.docx
The Russell Realty Group SWOT Analysis
Scenario Planning- Psychological Perspective
Artificial Intelligence – Time Bomb or The Promised Land?
Insider Threat Mitigation
Semi-quantitative approach to risk analysis
cybersecurity-series-2019-threat-hunting.pdf
Red Teaming and the Supply Chain
Step Into Security Webinar - Threat Assessments in Schools
Step Into Security Webinar - Threat Assessments for K-12 & University Campuses
Introduction to unconscious bias
Управление рисками: как перестать верить в иллюзии
Root Cause Analysis versus Shallow Cause Analysis
Ad

More from Roger Johnston (20)

PDF
In Risu Veritas: Humor & Security
PDF
Journal of Physical Security 15(1)
PDF
Security Audits.pdf
PDF
Camera Obscura and Security/Privacy
PDF
Vulnerability Assessment: The Missing Manual for the Missing Link
PDF
Journal of Physical Security 14(1)
PDF
Want seals with that?
PDF
Journal of Physical Security 13(1)
DOCX
Election Security 2020
PDF
A New Approach to Vulnerability Assessment
PDF
Devil's Dictionary of Security Terms
PDF
Vulnerability Assessments
PDF
Journal of Physical Security 12(3)
PDF
Journal of Physical Security 12(2)
PDF
Unconventional Security Devices
PDF
Making the Business Case for Security Investment
PDF
Journal of Physical Security 11(1)
PDF
Journal of Physical Security 10(1)
PDF
How to Remove Voter's Ink
PDF
Unconventional Security Metrics & Marginal Analysis
In Risu Veritas: Humor & Security
Journal of Physical Security 15(1)
Security Audits.pdf
Camera Obscura and Security/Privacy
Vulnerability Assessment: The Missing Manual for the Missing Link
Journal of Physical Security 14(1)
Want seals with that?
Journal of Physical Security 13(1)
Election Security 2020
A New Approach to Vulnerability Assessment
Devil's Dictionary of Security Terms
Vulnerability Assessments
Journal of Physical Security 12(3)
Journal of Physical Security 12(2)
Unconventional Security Devices
Making the Business Case for Security Investment
Journal of Physical Security 11(1)
Journal of Physical Security 10(1)
How to Remove Voter's Ink
Unconventional Security Metrics & Marginal Analysis
Ad

Recently uploaded (20)

PDF
Family Law: The Role of Communication in Mediation (www.kiu.ac.ug)
PDF
Module 3 - Functions of the Supervisor - Part 1 - Student Resource (1).pdf
PPTX
Board-Reporting-Package-by-Umbrex-5-23-23.pptx
PPTX
sales presentation، Training Overview.pptx
PDF
How to Get Approval for Business Funding
PPTX
Astra-Investor- business Presentation (1).pptx
PDF
Introduction to Generative Engine Optimization (GEO)
PPTX
svnfcksanfskjcsnvvjknsnvsdscnsncxasxa saccacxsax
PDF
ANALYZING THE OPPORTUNITIES OF DIGITAL MARKETING IN BANGLADESH TO PROVIDE AN ...
PDF
Booking.com The Global AI Sentiment Report 2025
PDF
Solaris Resources Presentation - Corporate August 2025.pdf
PDF
Nante Industrial Plug Factory: Engineering Quality for Modern Power Applications
PDF
Blood Collected straight from the donor into a blood bag and mixed with an an...
PPTX
Negotiation and Persuasion Skills: A Shrewd Person's Perspective
PPTX
TRAINNING, DEVELOPMENT AND APPRAISAL.pptx
PPT
Lecture 3344;;,,(,(((((((((((((((((((((((
PDF
IFRS Notes in your pocket for study all the time
PPTX
3. HISTORICAL PERSPECTIVE UNIIT 3^..pptx
PDF
Charisse Litchman: A Maverick Making Neurological Care More Accessible
PDF
Solara Labs: Empowering Health through Innovative Nutraceutical Solutions
Family Law: The Role of Communication in Mediation (www.kiu.ac.ug)
Module 3 - Functions of the Supervisor - Part 1 - Student Resource (1).pdf
Board-Reporting-Package-by-Umbrex-5-23-23.pptx
sales presentation، Training Overview.pptx
How to Get Approval for Business Funding
Astra-Investor- business Presentation (1).pptx
Introduction to Generative Engine Optimization (GEO)
svnfcksanfskjcsnvvjknsnvsdscnsncxasxa saccacxsax
ANALYZING THE OPPORTUNITIES OF DIGITAL MARKETING IN BANGLADESH TO PROVIDE AN ...
Booking.com The Global AI Sentiment Report 2025
Solaris Resources Presentation - Corporate August 2025.pdf
Nante Industrial Plug Factory: Engineering Quality for Modern Power Applications
Blood Collected straight from the donor into a blood bag and mixed with an an...
Negotiation and Persuasion Skills: A Shrewd Person's Perspective
TRAINNING, DEVELOPMENT AND APPRAISAL.pptx
Lecture 3344;;,,(,(((((((((((((((((((((((
IFRS Notes in your pocket for study all the time
3. HISTORICAL PERSPECTIVE UNIIT 3^..pptx
Charisse Litchman: A Maverick Making Neurological Care More Accessible
Solara Labs: Empowering Health through Innovative Nutraceutical Solutions

Understanding Vulnerability Assessments

  • 1. Vulnerability Assessments Roger G. Johnston Right Brain Sekurity http://rbsekurity.com The idea behind Vulnerability Assessments (VAs) is that we cannot prevent or test what we haven’t envisioned. Vulnerability Assessments (VAs) involve imaginatively thinking like the bad guys to discover security weaknesses (i.e., “vulnerabilities”), attack scenarios, and potential countermeasures. VAs are often confused with other security analysis techniques like threat assessments, risk assessments, security surveys, security audits, DBT, CARVER, pen testing, “red teaming”, etc. These other techniques may well be worth doing, but they commonly suffer from a number of problems: 1. They aren’t as good as VAs at finding vulnerabilities, attack scenarios, and countermeasures, often because they are focused on other things. 2. They are rarely done in an imaginative manner by creative people using critical thinking skills. 3. Unlike VAs, they don’t mimic the thought processes of the bad guys. If we want to predict what the bad guys may do, we need to think like them! 4. These (often formalistic) methods typically suffer from the Fallacy of Precision and/or claims of exactness, objectivity, and reproducibility that—upon close examination—are merely sham rigor. One of the problems is that the term “vulnerabilities” often gets hijacked so that it becomes confused in people’s minds with threats, risks, assets that we need to protect, features of our facility or security program, or attack scenarios. When this happens, it becomes difficult to think and talk about the problems with our security. Sloppy terminology does have consequences! https://www.amazon.com/dp/B08C9D73Z9