Skip to main content
Bitsight Knowledge Base Help Center home page
Security Performance Management
Continuous Monitoring
Vendor Risk Management
Trust Management Hub
Cyber Insurance
National Cybersecurity
  • Sign in
  • Submit a request
  1. Bitsight Knowledge Base
  2. Bitsight Data
  3. Classification Methods

Classification Methods

Considerations for classifying risk vectors, findings, and vulnerabilities. This includes how a particular malware family is classified as Compromised Systems risk vectors.

  • Risk Categories: Overview
  • Finding Severity
  • Vulnerability Classification
  • Exposure Detection & Evidence Certainty
  • Botnet Infections Finding Considerations
  • Spam Propagation Finding Considerations
  • Malware Servers Finding Considerations
  • Unsolicited Communications Finding Considerations
  • Potentially Exploited Finding Considerations
  • TLS/SSL Configuration Finding Considerations
  • Web Application Header Finding Considerations
  • Exposed Credentials Data Considerations

Contents © 2025 BitSight Technologies, Inc. ("Bitsight")

Privacy Policy | Disclaimer | Terms and Conditions | Contact Bitsight | Bitsight Academy | Bitsight Support