7 Vulnerabilities That You Can Never Patch

precious

Well-known member
Apr 22, 2024
293
151
6,621
Principles (reasons for effectiveness) objective 1.1 CompTIA Security plus Sy0-601

Authority: Having faith in those in positions of power, even when they are incorrect. An employee was duped by a CEO scam email into sending $47 million.

Intimidation: Fear forces quick, irrational actions. IRS scam calls threaten arrests for unpaid taxes.

Consensus: Adhering to the herd, even when it doesn't make sense. "Your coworkers already signed up for this!" emails lead to phishing pages.

Scarcity: Limited-time offers. Scammers use "limited deals" on phony websites to entice victims of Black Friday scams.

Familiarity: Trusting what is known, even if it is out of date. False WeTransfer emails spread viruses by using recognizable branding.

Trust: Having too much faith in people or institutions. Scammers on LinkedIn establish a rapport while sending harmful links.

Urgency: Making snap decisions without giving them enough thought. Credential theft results from "Reset your password now or lose access!" prompts.
 
I beg to differ that these things cannot be "patched" or remediated.

For much of this, using the Zero Trust model within your organization deals with situations that cannot be necessarily managed through software. For other things, a solid training approach with regular testing can deal with these things. I remember an article I wrote long ago about Layer 8 security - which addresses where most vulnerabilities are.

And remember, there is those very old, near cliche "Defense in Depth" strategies that also deals with the human element.

Attached to this are what I've posted in my classrooms for security students.

/r
 

Attachments

  • twelve_commandments_of_security.pdf
    36.8 KB · Views: 2
  • Love
Reactions: precious
I beg to differ that these things cannot be "patched" or remediated.

For much of this, using the Zero Trust model within your organization deals with situations that cannot be necessarily managed through software. For other things, a solid training approach with regular testing can deal with these things. I remember an article I wrote long ago about Layer 8 security - which addresses where most vulnerabilities are.

And remember, there is those very old, near cliche "Defense in Depth" strategies that also deals with the human element.

Attached to this are what I've posted in my classrooms for security students.

/r
You're absolutely right! Zero Trust, training, and Layer 8 security can significantly reduce the risks associated with these vulnerabilities. While they can't 'patch' human nature entirely, they help mitigate how effectively these principles can be exploited.

Curious to see what you have shared in the file—Although I can't help but wonder if this is a test to see if I will click without thinking! 😉. Either way, I appreciate the additional insights and materials to learn from you.
 
Curious to see what you have shared in the file—Although I can't help but wonder if this is a test to see if I will click without thinking! 😉. Either way, I appreciate the additional insights and materials to learn from you.
While your trepidation and caution are good perspectives to have, it's just a simple PDF. Nothing to fear in that one.

/r
 
  • Like
Reactions: precious