From the course: ISC2 Certified Information Systems Security Professional (CISSP) (2024) Cert Prep

Unlock this course with a free trial

Join today to access over 23,400 courses taught by industry experts.

What is vulnerability management?

What is vulnerability management?

- [Instructor] Modern computing systems and applications are extremely complicated. It might not surprise you to learn that there are millions and millions of lines of code contained in every major piece of software that you run. For example, the Linux kernel is the core part of the operating system that handles input, output, memory management, CPU management, and other core tasks. This central piece of the operating system contains over 24 million lines of code, and it changes at an astonishing rate. Thousands of lines of code are added, removed, and changed every day as the kernel evolves. Given the complexity of modern software, it's inevitable that developers will make mistakes, and some of those mistakes will lead to security vulnerabilities. In the security community, we have a well understood process for managing vulnerabilities. When a company learns of a vulnerability in their software, they analyze the issue, and develop a fix for the problem known as a patch. They then…

Contents