Classification Methods
Considerations for classifying risk vectors, findings, and vulnerabilities. This includes how a particular malware family is classified as Compromised Systems risk vectors.
- Botnet Infections Finding Considerations
- Spam Propagation Finding Considerations
- Malware Servers Finding Considerations
- Unsolicited Communications Finding Considerations
- Potentially Exploited Finding Considerations
- TLS/SSL Configuration Finding Considerations
- Web Application Header Finding Considerations
- Exposed Credentials Finding Considerations
- Exposure Detection
- Vulnerability Classification
- Vulnerability Evidence Certainty
- Enhanced Rating Risk Vectors