Page 1167 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1167

of patches so that they have adequate time to test and deploy them.

                  Many organizations that have support contracts with Microsoft
                  have advance notification of the patches prior to Patch Tuesday.
                  Some vulnerabilities are significant enough that Microsoft releases
                  them “out-of-band.” In other words, instead of waiting for the next
                  Patch Tuesday to release a patch, Microsoft releases some patches
                  earlier.

                  Attackers realize that many organizations do not patch their

                  systems right away. Some attackers have reverse-engineered
                  patches to identify the underlying vulnerability and then created
                  methods to exploit the vulnerability. These attacks often start
                  within a day after Patch Tuesday, giving rise to the term exploit
                  Wednesday.

                  However, many attacks occur on unpatched systems weeks,
                  months, and even years after vendors release the patches. In other

                  words, many systems remain unpatched and attackers exploit
                  them much later than a day after the vendor released the patch. As
                  an example, the WannaCry ransomware attack in May 2017
                  infected more than 230,000 systems within a day. The attack
                  exploited systems that didn’t have a Microsoft security update that
                  was released in March 2017, about two months earlier.




               Vulnerability Management


               Vulnerability management refers to regularly identifying
               vulnerabilities, evaluating them, and taking steps to mitigate risks
               associated with them. It isn’t possible to eliminate risks. Similarly, it
               isn’t possible to eliminate all vulnerabilities. However, an effective
               vulnerability management program helps an organization ensure that
               they are regularly evaluating vulnerabilities and mitigating the
               vulnerabilities that represent the greatest risks. Two common

               elements of a vulnerability management program are routine
               vulnerability scans and periodic vulnerability assessments.



                             One of the most common vulnerabilities within an
   1162   1163   1164   1165   1166   1167   1168   1169   1170   1171   1172