Skip to main content
Bitsight Knowledge Base Help Center home page
Security Posture Management
Continuous Monitoring
Vendor Risk Management
Trust Management Hub
Cyber Insurance
National Cybersecurity
    Bitsight API docs Bitsight Academy
    • Sign in
    • Submit a request
  1. Bitsight Knowledge Base
  2. Bitsight Data
  3. Classification Methods

Classification Methods

Considerations for classifying risk vectors, findings, and vulnerabilities. This includes how a particular malware family is classified as Compromised Systems risk vectors.

  • Risk Categories: Overview
  • Finding Severity
  • Botnet Infections Finding Considerations
  • Spam Propagation Finding Considerations
  • Malware Servers Finding Considerations
  • Unsolicited Communications Finding Considerations
  • Potentially Exploited Finding Considerations
  • TLS/SSL Configuration Finding Considerations
  • Web Application Header Finding Considerations
  • Exposed Credentials Data Considerations

Contents © 2025 BitSight Technologies, Inc. ("Bitsight")

Privacy Policy | Disclaimer | Terms and Conditions | Contact Bitsight | Bitsight Academy | Bitsight Support