Computer Science Grade 8 20 min

Vulnerability Assessment

Vulnerability Assessment

Tutorial Preview

1

Introduction & Learning Objectives

Learning Objectives Define what a vulnerability is and distinguish it from a threat and a risk. Identify at least three common types of vulnerabilities in software and websites. Explain the four main steps of a vulnerability assessment process. Use a simple formula to calculate a basic risk score for a given vulnerability. Analyze a simple system (like a login page) and list potential vulnerabilities. Describe the purpose of a CVE (Common Vulnerabilities and Exposures) list. Have you ever left your front door unlocked? 🚪 A vulnerability in a computer system is like an unlocked door, just waiting for someone to walk through! In this lesson, you'll become a digital detective! We will learn how to find these 'unlocked doors' in computer systems through a proces...
2

Key Concepts & Vocabulary

TermDefinitionExample VulnerabilityA weakness or flaw in a computer system, software, or process that could be exploited (taken advantage of) by a threat.A website's login form that doesn't check for a strong password, allowing someone to easily guess it. ThreatAny potential danger that can exploit a vulnerability. This could be a person (like a hacker) or an event (like a power outage).A hacker who actively tries to guess weak passwords on a website. RiskThe potential for loss or damage when a threat exploits a vulnerability. It's the combination of the likelihood of something bad happening and the impact if it does.The high risk of student accounts being taken over because of the weak password vulnerability and the presence of hackers trying to exploit it. ExploitA piece...
3

Core Syntax & Patterns

The Vulnerability Assessment Cycle 1. Identify Assets -> 2. Scan for Vulnerabilities -> 3. Analyze and Prioritize -> 4. Report and Remediate This is the standard four-step process for conducting a vulnerability assessment. You must first know what you're protecting (assets), then find the weaknesses (scan), figure out which ones are most important (analyze), and finally, report them so they can be fixed (remediate). Basic Risk Score Formula Risk = Likelihood x Impact Use this simple formula to prioritize vulnerabilities. 'Likelihood' is how likely the vulnerability is to be exploited (e.g., 1-10 scale). 'Impact' is how bad the damage would be if it were exploited (e.g., 1-10 scale). A higher score means a higher priority to fix.

4 more steps in this tutorial

Sign up free to access the complete tutorial with worked examples and practice.

Sign Up Free to Continue

Sample Practice Questions

Challenging
A school portal has two vulnerabilities. Issue #1: A flaw allows a user to see another student's homework grades (Likelihood=7, Impact=5). Issue #2: A flaw allows a user to change the school's homepage logo (Likelihood=9, Impact=2). Based on the Risk Score formula, which issue presents a higher risk?
A.Issue #2, because its Risk Score of 18 is higher than Issue #1's score of 35.
B.Issue #1, because its Risk Score of 35 is higher than Issue #2's score of 18.
C.They are equal risk because Issue #1 has higher impact and Issue #2 has higher likelihood.
D.Issue #2, because it is more likely to be discovered by students.
Challenging
An intern is told to assess a new web server. They run an automated scanner, find one critical vulnerability, fix it, and then email their boss that the server is now '100% secure'. What is the biggest flaw in this process according to the tutorial?
A.They should have identified the assets before running the scan.
B.They failed to analyze, prioritize, and report on ALL findings before remediating, and they stopped after the first flaw.
C.They should have used two different automated scanners to be sure.
D.They fixed the vulnerability too quickly without getting permission.
Challenging
A school library sets up a guest Wi-Fi network using the router's default password. A student connects and is able to view unencrypted web traffic from other users. Which key concept from the tutorial is NOT explicitly demonstrated in this scenario?
A.Vulnerability (the default password)
B.Threat (the student viewing traffic)
C.Risk (the potential for data theft)
D.CVE (a publicly listed ID for the vulnerability)

Want to practice and check your answers?

Sign up to access all questions with instant feedback, explanations, and progress tracking.

Start Practicing Free

More from Cybersecurity Advanced

Ready to find your learning gaps?

Take a free diagnostic test and get a personalized learning plan in minutes.