Logo
Security Performance Management
Continuous Monitoring
Cyber Insurance
National Cybersecurity
Submit a request
Sign in
  1. Bitsight Knowledge Base
  2. Bitsight Data
  3. Classification Methods

Classification Methods

Follow New articles New articles and comments

Considerations for classifying risk vectors, findings, and vulnerabilities. This includes how a particular malware family is classified as Compromised Systems risk vectors.

  • Botnet Infections Finding Considerations
  • Spam Propagation Finding Considerations
  • Malware Servers Finding Considerations
  • Unsolicited Communications Finding Considerations
  • Potentially Exploited Finding Considerations
  • TLS/SSL Configuration Finding Considerations
  • Web Application Header Finding Considerations
  • Exposed Credentials Finding Considerations
  • Exposure Detection
  • Vulnerability Classification
  • Vulnerability Evidence Certainty
  • Enhanced Rating Risk Vectors
Contents © 2023 Bitsight Technologies
  • Privacy Policy |
  • Disclaimer |
  • Terms and Conditions |
  • Contact Bitsight |
  • Bitsight Academy |
  • Bitsight Support