{"id":4985,"date":"2020-07-21T11:41:07","date_gmt":"2020-07-21T11:41:07","guid":{"rendered":"https:\/\/securityx.ca\/blog\/?p=4985"},"modified":"2020-08-05T09:35:19","modified_gmt":"2020-08-05T09:35:19","slug":"what-are-the-4-main-types-of-vulnerability","status":"publish","type":"post","link":"https:\/\/securityx.ca\/blog\/what-are-the-4-main-types-of-vulnerability\/","title":{"rendered":"WHAT ARE THE 4 MAIN TYPES OF VULNERABILITY?"},"content":{"rendered":"<h1><strong>WHAT ARE THE 4 MAIN TYPES OF VULNERABILITY?<\/strong><\/h1>\n<p>In this modern age a majority of businesses are learning new ways to overcome dire vulnerabilities that can increase the rate of cyber threats. It adversely affect the community\u2019s ability to prevent, mitigate, prepare for or respond to a hazard. Absence of coping strategies is also a part of vulnerability and has to be considered in vulnerability assessment.<\/p>\n<p>&nbsp;<\/p>\n<h2><strong>WHAT IS VULNERABILITY?<\/strong><\/h2>\n<p>Vulnerability describes the characteristics and circumstances of a community, system or asset that make it susceptible to the damaging effects of a hazard. There are many aspects of vulnerability, arising from various physical, social, economic, and environmental factors. Examples may include:<\/p>\n<ul>\n<li>Poor design and construction of buildings,<\/li>\n<li>Inadequate protection of assets,<\/li>\n<li>Lack of public information and awareness,<\/li>\n<li>Limited official recognition of risks and preparedness measures, and<\/li>\n<li>Disregard for wise environmental management.<\/li>\n<\/ul>\n<p>Vulnerability varies significantly within a community and over time. This definition identifies vulnerability as a characteristic of the element of interest (community, system or asset) which is independent of its exposure. However, in common use the word is often used more broadly to include the element\u2019s exposure.<\/p>\n<p>&nbsp;<\/p>\n<p class=\"card-title entry-title\"><a href=\"https:\/\/securityx.ca\/blog\/threat-risk-assessment\/\" title=\"TOP 5 THREAT RISK ASSESSMENT APPROACHES FOR CYBER SECURITY PROFESSIONALS\" rel=\"bookmark\">TOP 5 THREAT RISK ASSESSMENT APPROACHES FOR CYBER SECURITY PROFESSIONALS<\/a><\/p>\n<p>&nbsp;<\/p>\n<h2><strong>WHAT CAUSES VULNERABILITIES?<\/strong><\/h2>\n<p>There are many causes of vulnerabilities including:<\/p>\n<p>&nbsp;<\/p>\n<h3><strong>COMPLEXITY<\/strong><\/h3>\n<div id=\"attachment_5077\" style=\"width: 760px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-5077\" decoding=\"async\" loading=\"lazy\" src=\"https:\/\/securityx.ca\/blog\/wp-content\/uploads\/COMPLEXITY-1024x576.jpg\" alt=\"COMPLEXITY\" width=\"750\" height=\"422\" class=\"size-large wp-image-5077\" srcset=\"https:\/\/securityx.ca\/blog\/wp-content\/uploads\/COMPLEXITY-1024x576.jpg 1024w, https:\/\/securityx.ca\/blog\/wp-content\/uploads\/COMPLEXITY-300x169.jpg 300w, https:\/\/securityx.ca\/blog\/wp-content\/uploads\/COMPLEXITY-768x432.jpg 768w, https:\/\/securityx.ca\/blog\/wp-content\/uploads\/COMPLEXITY.jpg 1200w\" sizes=\"(max-width: 750px) 100vw, 750px\" \/><p id=\"caption-attachment-5077\" class=\"wp-caption-text\">COMPLEXITY<\/p><\/div>\n<p>Complex systems increase the probability of a flaw, misconfiguration or unintended access.<\/p>\n<h3><strong>FAMILIARITY<\/strong><\/h3>\n<div id=\"attachment_5081\" style=\"width: 760px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-5081\" decoding=\"async\" loading=\"lazy\" src=\"https:\/\/securityx.ca\/blog\/wp-content\/uploads\/FAMILIARITY-1024x576.jpg\" alt=\"FAMILIARITY\" width=\"750\" height=\"422\" class=\"size-large wp-image-5081\" srcset=\"https:\/\/securityx.ca\/blog\/wp-content\/uploads\/FAMILIARITY-1024x576.jpg 1024w, https:\/\/securityx.ca\/blog\/wp-content\/uploads\/FAMILIARITY-300x169.jpg 300w, https:\/\/securityx.ca\/blog\/wp-content\/uploads\/FAMILIARITY-768x432.jpg 768w, https:\/\/securityx.ca\/blog\/wp-content\/uploads\/FAMILIARITY.jpg 1200w\" sizes=\"(max-width: 750px) 100vw, 750px\" \/><p id=\"caption-attachment-5081\" class=\"wp-caption-text\">FAMILIARITY<\/p><\/div>\n<p>Common code, software, operating systems and hardware increase the probability that an attacker can find or has information about known vulnerabilities.<\/p>\n<h3><strong>CONNECTIVITY<\/strong><\/h3>\n<div id=\"attachment_5078\" style=\"width: 760px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-5078\" decoding=\"async\" loading=\"lazy\" src=\"https:\/\/securityx.ca\/blog\/wp-content\/uploads\/CONNECTIVITY-1024x576.jpg\" alt=\"CONNECTIVITY\" width=\"750\" height=\"422\" class=\"size-large wp-image-5078\" srcset=\"https:\/\/securityx.ca\/blog\/wp-content\/uploads\/CONNECTIVITY-1024x576.jpg 1024w, https:\/\/securityx.ca\/blog\/wp-content\/uploads\/CONNECTIVITY-300x169.jpg 300w, https:\/\/securityx.ca\/blog\/wp-content\/uploads\/CONNECTIVITY-768x432.jpg 768w, https:\/\/securityx.ca\/blog\/wp-content\/uploads\/CONNECTIVITY.jpg 1200w\" sizes=\"(max-width: 750px) 100vw, 750px\" \/><p id=\"caption-attachment-5078\" class=\"wp-caption-text\">CONNECTIVITY<\/p><\/div>\n<p>The more connected a device is the higher the chance of a vulnerability.<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/securityx.ca\/blog\/cloud-based-managed-services\/\" title=\"TOP 10 EMERGING BENEFITS FOR CLOUD BASED MANAGED SERVICES\" rel=\"bookmark\">TOP 10 EMERGING BENEFITS FOR CLOUD BASED MANAGED SERVICES<\/a><\/p>\n<p>&nbsp;<\/p>\n<h3><strong>POOR PASSWORD MANAGEMENT<\/strong><\/h3>\n<div id=\"attachment_5085\" style=\"width: 760px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-5085\" decoding=\"async\" loading=\"lazy\" src=\"https:\/\/securityx.ca\/blog\/wp-content\/uploads\/POOR-PASSWORD-MANAGEMENT-1024x576.png\" alt=\"POOR PASSWORD MANAGEMENT\" width=\"750\" height=\"422\" class=\"size-large wp-image-5085\" srcset=\"https:\/\/securityx.ca\/blog\/wp-content\/uploads\/POOR-PASSWORD-MANAGEMENT-1024x576.png 1024w, https:\/\/securityx.ca\/blog\/wp-content\/uploads\/POOR-PASSWORD-MANAGEMENT-300x169.png 300w, https:\/\/securityx.ca\/blog\/wp-content\/uploads\/POOR-PASSWORD-MANAGEMENT-768x432.png 768w, https:\/\/securityx.ca\/blog\/wp-content\/uploads\/POOR-PASSWORD-MANAGEMENT.png 1200w\" sizes=\"(max-width: 750px) 100vw, 750px\" \/><p id=\"caption-attachment-5085\" class=\"wp-caption-text\">POOR PASSWORD MANAGEMENT<\/p><\/div>\n<p>Weak passwords can be broken with brute force and reusing passwords can result in one data breach becoming many.<\/p>\n<h3><strong>OPERATING SYSTEM FLAWS<\/strong><\/h3>\n<div id=\"attachment_5083\" style=\"width: 760px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-5083\" decoding=\"async\" loading=\"lazy\" src=\"https:\/\/securityx.ca\/blog\/wp-content\/uploads\/OPERATING-SYSTEM-FLAWS-1024x576.jpg\" alt=\"OPERATING SYSTEM FLAWS\" width=\"750\" height=\"422\" class=\"size-large wp-image-5083\" srcset=\"https:\/\/securityx.ca\/blog\/wp-content\/uploads\/OPERATING-SYSTEM-FLAWS-1024x576.jpg 1024w, https:\/\/securityx.ca\/blog\/wp-content\/uploads\/OPERATING-SYSTEM-FLAWS-300x169.jpg 300w, https:\/\/securityx.ca\/blog\/wp-content\/uploads\/OPERATING-SYSTEM-FLAWS-768x432.jpg 768w, https:\/\/securityx.ca\/blog\/wp-content\/uploads\/OPERATING-SYSTEM-FLAWS.jpg 1200w\" sizes=\"(max-width: 750px) 100vw, 750px\" \/><p id=\"caption-attachment-5083\" class=\"wp-caption-text\">OPERATING SYSTEM FLAWS<\/p><\/div>\n<p>Like any software, operating systems can have flaws. Operating systems that are insecure by default and give all users full access can allow viruses and malware to execute commands.<\/p>\n<h3><strong>INTERNET USAGE<\/strong><\/h3>\n<div id=\"attachment_5082\" style=\"width: 760px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-5082\" decoding=\"async\" loading=\"lazy\" src=\"https:\/\/securityx.ca\/blog\/wp-content\/uploads\/INTERNET-USAGE-1024x576.jpg\" alt=\"INTERNET USAGE\" width=\"750\" height=\"422\" class=\"size-large wp-image-5082\" srcset=\"https:\/\/securityx.ca\/blog\/wp-content\/uploads\/INTERNET-USAGE-1024x576.jpg 1024w, https:\/\/securityx.ca\/blog\/wp-content\/uploads\/INTERNET-USAGE-300x169.jpg 300w, https:\/\/securityx.ca\/blog\/wp-content\/uploads\/INTERNET-USAGE-768x432.jpg 768w, https:\/\/securityx.ca\/blog\/wp-content\/uploads\/INTERNET-USAGE.jpg 1200w\" sizes=\"(max-width: 750px) 100vw, 750px\" \/><p id=\"caption-attachment-5082\" class=\"wp-caption-text\">INTERNET USAGE<\/p><\/div>\n<p>The Internet is full of spyware and adware that can be installed automatically on computers.<\/p>\n<h3><strong>SOFTWARE BUGS<\/strong><\/h3>\n<div id=\"attachment_5087\" style=\"width: 760px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-5087\" decoding=\"async\" loading=\"lazy\" src=\"https:\/\/securityx.ca\/blog\/wp-content\/uploads\/SOFTWARE-BUGS-1024x576.jpg\" alt=\"SOFTWARE BUGS\" width=\"750\" height=\"422\" class=\"size-large wp-image-5087\" srcset=\"https:\/\/securityx.ca\/blog\/wp-content\/uploads\/SOFTWARE-BUGS-1024x576.jpg 1024w, https:\/\/securityx.ca\/blog\/wp-content\/uploads\/SOFTWARE-BUGS-300x169.jpg 300w, https:\/\/securityx.ca\/blog\/wp-content\/uploads\/SOFTWARE-BUGS-768x432.jpg 768w, https:\/\/securityx.ca\/blog\/wp-content\/uploads\/SOFTWARE-BUGS.jpg 1200w\" sizes=\"(max-width: 750px) 100vw, 750px\" \/><p id=\"caption-attachment-5087\" class=\"wp-caption-text\">SOFTWARE BUGS<\/p><\/div>\n<p>Programmers can accidentally or deliberately leave an exploitable bug in software.<\/p>\n<h3><strong>UNCHECKED USER INPUT<\/strong><\/h3>\n<div id=\"attachment_5088\" style=\"width: 760px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-5088\" decoding=\"async\" loading=\"lazy\" src=\"https:\/\/securityx.ca\/blog\/wp-content\/uploads\/UNCHECKED-USER-INPUT-1024x576.jpg\" alt=\"UNCHECKED USER INPUT\" width=\"750\" height=\"422\" class=\"size-large wp-image-5088\" srcset=\"https:\/\/securityx.ca\/blog\/wp-content\/uploads\/UNCHECKED-USER-INPUT-1024x576.jpg 1024w, https:\/\/securityx.ca\/blog\/wp-content\/uploads\/UNCHECKED-USER-INPUT-300x169.jpg 300w, https:\/\/securityx.ca\/blog\/wp-content\/uploads\/UNCHECKED-USER-INPUT-768x432.jpg 768w, https:\/\/securityx.ca\/blog\/wp-content\/uploads\/UNCHECKED-USER-INPUT.jpg 1200w\" sizes=\"(max-width: 750px) 100vw, 750px\" \/><p id=\"caption-attachment-5088\" class=\"wp-caption-text\">UNCHECKED USER INPUT<\/p><\/div>\n<p>If your website or software assume all input is safe it may execute unintended SQL commands.<\/p>\n<h3><strong>EMPLOYEES<\/strong><\/h3>\n<div id=\"attachment_5080\" style=\"width: 760px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-5080\" decoding=\"async\" loading=\"lazy\" src=\"https:\/\/securityx.ca\/blog\/wp-content\/uploads\/EMPLOYEES-1024x576.jpg\" alt=\"EMPLOYEES\" width=\"750\" height=\"422\" class=\"size-large wp-image-5080\" srcset=\"https:\/\/securityx.ca\/blog\/wp-content\/uploads\/EMPLOYEES-1024x576.jpg 1024w, https:\/\/securityx.ca\/blog\/wp-content\/uploads\/EMPLOYEES-300x169.jpg 300w, https:\/\/securityx.ca\/blog\/wp-content\/uploads\/EMPLOYEES-768x432.jpg 768w, https:\/\/securityx.ca\/blog\/wp-content\/uploads\/EMPLOYEES.jpg 1200w\" sizes=\"(max-width: 750px) 100vw, 750px\" \/><p id=\"caption-attachment-5080\" class=\"wp-caption-text\">EMPLOYEES<\/p><\/div>\n<p>The biggest vulnerability in any organization is the human at the end of the system. Social engineering is the biggest threat to the majority of organizations.<\/p>\n<p>&nbsp;<\/p>\n<h2><strong>WHAT IS VULNERABILITY MANAGEMENT?<\/strong><\/h2>\n<p>Vulnerability management is a cyclical practice of identifying, classifying, remediating and mitigating security vulnerabilities. The essential elements of vulnerability management include vulnerability detection, vulnerability assessment and remediation. The methods of vulnerability detection include:<\/p>\n<ul>\n<li>Vulnerability scanning<\/li>\n<li>Penetration testing<\/li>\n<li>Google hacking<\/li>\n<\/ul>\n<p>And once a vulnerability is found, it goes through the vulnerability assessment process.<\/p>\n<p>&nbsp;<\/p>\n<h1><strong>WHAT ARE THE 4 MAIN TYPES OF VULNERABILITY?<\/strong><\/h1>\n<p>There are four basic and major vulnerabilities:<\/p>\n<p>&nbsp;<\/p>\n<h2><strong>PHYSICAL VULNERABILITY<\/strong><\/h2>\n<div id=\"attachment_5084\" style=\"width: 760px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-5084\" decoding=\"async\" loading=\"lazy\" src=\"https:\/\/securityx.ca\/blog\/wp-content\/uploads\/PHYSICAL-VULNERABILITY-1024x576.jpg\" alt=\"PHYSICAL VULNERABILITY\" width=\"750\" height=\"422\" class=\"size-large wp-image-5084\" srcset=\"https:\/\/securityx.ca\/blog\/wp-content\/uploads\/PHYSICAL-VULNERABILITY-1024x576.jpg 1024w, https:\/\/securityx.ca\/blog\/wp-content\/uploads\/PHYSICAL-VULNERABILITY-300x169.jpg 300w, https:\/\/securityx.ca\/blog\/wp-content\/uploads\/PHYSICAL-VULNERABILITY-768x432.jpg 768w, https:\/\/securityx.ca\/blog\/wp-content\/uploads\/PHYSICAL-VULNERABILITY.jpg 1200w\" sizes=\"(max-width: 750px) 100vw, 750px\" \/><p id=\"caption-attachment-5084\" class=\"wp-caption-text\">PHYSICAL VULNERABILITY<\/p><\/div>\n<p>The physical vulnerability of an area also depends on its geographic proximity to the source and origin of the disasters e.g. if an area lies near the coast lines, fault lines, unstable hills etc. it makes the area more vulnerable to disasters as compared to an area that is far away from the origin of the disaster. Physical vulnerability includes the difficulty in access to water resources, means of communications, hospitals, police stations, fire brigades, roads, bridges and exits of a building or\/an area, in case of disasters. Furthermore, the lack of proper planning and implementation in construction of residential and commercial buildings results in buildings that are weaker and vulnerable in earthquakes, floods, landslides and other hazards.<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/securityx.ca\/blog\/how-to-free-up-disk-space\/\" title=\"WAYS TO FREE UP SPACE ON YOUR DESKTOP\" rel=\"bookmark\">WAYS TO FREE UP SPACE ON YOUR DESKTOP<\/a><\/p>\n<p>&nbsp;<\/p>\n<h2><strong>ECONOMIC VULNERABILITY<\/strong><\/h2>\n<div id=\"attachment_5079\" style=\"width: 760px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-5079\" decoding=\"async\" loading=\"lazy\" src=\"https:\/\/securityx.ca\/blog\/wp-content\/uploads\/ECONOMIC-VULNERABILITY-1024x576.jpg\" alt=\"ECONOMIC VULNERABILITY\" width=\"750\" height=\"422\" class=\"size-large wp-image-5079\" srcset=\"https:\/\/securityx.ca\/blog\/wp-content\/uploads\/ECONOMIC-VULNERABILITY-1024x576.jpg 1024w, https:\/\/securityx.ca\/blog\/wp-content\/uploads\/ECONOMIC-VULNERABILITY-300x169.jpg 300w, https:\/\/securityx.ca\/blog\/wp-content\/uploads\/ECONOMIC-VULNERABILITY-768x432.jpg 768w, https:\/\/securityx.ca\/blog\/wp-content\/uploads\/ECONOMIC-VULNERABILITY.jpg 1200w\" sizes=\"(max-width: 750px) 100vw, 750px\" \/><p id=\"caption-attachment-5079\" class=\"wp-caption-text\">ECONOMIC VULNERABILITY<\/p><\/div>\n<p>Economic vulnerability of a community can be assessed by determining how varied its sources of income are, the ease of access and control over means of production, adequacy of economic fall back mechanisms and the availability of natural resources in the area.<\/p>\n<h2><strong>SOCIAL VULNERABILITY<\/strong><\/h2>\n<div id=\"attachment_5086\" style=\"width: 760px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-5086\" decoding=\"async\" loading=\"lazy\" src=\"https:\/\/securityx.ca\/blog\/wp-content\/uploads\/SOCIAL-VULNERABILITY-1024x576.jpg\" alt=\"SOCIAL VULNERABILITY\" width=\"750\" height=\"422\" class=\"size-large wp-image-5086\" srcset=\"https:\/\/securityx.ca\/blog\/wp-content\/uploads\/SOCIAL-VULNERABILITY-1024x576.jpg 1024w, https:\/\/securityx.ca\/blog\/wp-content\/uploads\/SOCIAL-VULNERABILITY-300x169.jpg 300w, https:\/\/securityx.ca\/blog\/wp-content\/uploads\/SOCIAL-VULNERABILITY-768x432.jpg 768w, https:\/\/securityx.ca\/blog\/wp-content\/uploads\/SOCIAL-VULNERABILITY.jpg 1200w\" sizes=\"(max-width: 750px) 100vw, 750px\" \/><p id=\"caption-attachment-5086\" class=\"wp-caption-text\">SOCIAL VULNERABILITY<\/p><\/div>\n<p>A socially vulnerable community has weak family structures, lack of leadership for decision making and conflict resolution, unequal participation in decision making, weak or no community organizations, and the one in which people are discriminated on racial, ethnic, linguistic or religious basis. Other social factors such as culture, tradition, religion, local norms and values, economic standard, and political <a href=\"http:\/\/www.odpm.gov.tt\/node\/162\">accountability also play a vital role determining the social vulnerability<\/a> of a community. Social vulnerability to natural phenomena is greatest among the poorest people in developing countries owing to a lack of information and resources with which to take the appropriate measures. Within this group, children, women and the elderly are considered to be the most vulnerable. To reduce social vulnerability, all of the above factors must be addressed but this requires knowledge and understanding of the local conditions, which can in most cases only be provided by local actors.<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/securityx.ca\/blog\/trovi-search-removal\/\" title=\"HOW TO REMOVE TROVI SEARCH FROM THE WEB BROWSER?\" rel=\"bookmark\">HOW TO REMOVE TROVI SEARCH FROM THE WEB BROWSER?<\/a><\/p>\n<p>&nbsp;<\/p>\n<h2><strong>ATTITUDINAL VULNERABILITY<\/strong><\/h2>\n<div id=\"attachment_5076\" style=\"width: 760px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-5076\" decoding=\"async\" loading=\"lazy\" src=\"https:\/\/securityx.ca\/blog\/wp-content\/uploads\/ATTITUDINAL-VULNERABILITY-1024x576.jpg\" alt=\"ATTITUDINAL VULNERABILITY\" width=\"750\" height=\"422\" class=\"size-large wp-image-5076\" srcset=\"https:\/\/securityx.ca\/blog\/wp-content\/uploads\/ATTITUDINAL-VULNERABILITY-1024x576.jpg 1024w, https:\/\/securityx.ca\/blog\/wp-content\/uploads\/ATTITUDINAL-VULNERABILITY-300x169.jpg 300w, https:\/\/securityx.ca\/blog\/wp-content\/uploads\/ATTITUDINAL-VULNERABILITY-768x432.jpg 768w, https:\/\/securityx.ca\/blog\/wp-content\/uploads\/ATTITUDINAL-VULNERABILITY.jpg 1200w\" sizes=\"(max-width: 750px) 100vw, 750px\" \/><p id=\"caption-attachment-5076\" class=\"wp-caption-text\">ATTITUDINAL VULNERABILITY<\/p><\/div>\n<p>A community which has negative attitude towards change and lacks initiative in life resultantly become more and more dependent on external support. They cannot act independently. Their sources of livelihood do not have variety, lacks entrepreneurship and do not possess the concept of collectivism. This brings about disunity and individualism in the society. Thus, they become victims of conflicts, hopelessness and pessimism which reduces their capacity of coping with a disaster. And for more updates you are free to visit <a href=\"https:\/\/www.securityx.ca\/\">Securityx<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>WHAT ARE THE 4 MAIN TYPES OF VULNERABILITY? In this modern age a majority of businesses are learning new ways to overcome dire vulnerabilities that can increase the rate of cyber threats. It adversely affect the community\u2019s ability to prevent, mitigate, prepare for or respond to a hazard. Absence of [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":4988,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[37],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v14.0.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\r\n<title>WHAT ARE THE 4 MAIN TYPES OF VULNERABILITY?<\/title>\r\n<meta name=\"description\" content=\"What are the 4 main types of vulnerability? here we have crafted a detailed blog on types of vulnerability lets dive into that.\" \/>\r\n<meta name=\"robots\" content=\"index, follow\" \/>\r\n<meta name=\"googlebot\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\r\n<meta name=\"bingbot\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\r\n<link rel=\"canonical\" href=\"https:\/\/securityx.ca\/blog\/what-are-the-4-main-types-of-vulnerability\/\" \/>\r\n<meta property=\"og:locale\" content=\"en_US\" \/>\r\n<meta property=\"og:type\" content=\"article\" \/>\r\n<meta property=\"og:title\" content=\"WHAT ARE THE 4 MAIN TYPES OF VULNERABILITY?\" \/>\r\n<meta property=\"og:description\" content=\"What are the 4 main types of vulnerability? here we have crafted a detailed blog on types of vulnerability lets dive into that.\" \/>\r\n<meta property=\"og:url\" content=\"https:\/\/securityx.ca\/blog\/what-are-the-4-main-types-of-vulnerability\/\" \/>\r\n<meta property=\"og:site_name\" content=\"SecurityX Blog\" \/>\r\n<meta property=\"article:published_time\" content=\"2020-07-21T11:41:07+00:00\" \/>\r\n<meta property=\"article:modified_time\" content=\"2020-08-05T09:35:19+00:00\" \/>\r\n<meta property=\"og:image\" content=\"https:\/\/securityx.ca\/blog\/wp-content\/uploads\/what_are_the_4_main_types_of_vulnerability.jpg\" \/>\r\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\r\n<!-- \/ Yoast SEO plugin. -->","_links":{"self":[{"href":"https:\/\/securityx.ca\/blog\/wp-json\/wp\/v2\/posts\/4985"}],"collection":[{"href":"https:\/\/securityx.ca\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securityx.ca\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securityx.ca\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/securityx.ca\/blog\/wp-json\/wp\/v2\/comments?post=4985"}],"version-history":[{"count":4,"href":"https:\/\/securityx.ca\/blog\/wp-json\/wp\/v2\/posts\/4985\/revisions"}],"predecessor-version":[{"id":5089,"href":"https:\/\/securityx.ca\/blog\/wp-json\/wp\/v2\/posts\/4985\/revisions\/5089"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securityx.ca\/blog\/wp-json\/wp\/v2\/media\/4988"}],"wp:attachment":[{"href":"https:\/\/securityx.ca\/blog\/wp-json\/wp\/v2\/media?parent=4985"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securityx.ca\/blog\/wp-json\/wp\/v2\/categories?post=4985"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securityx.ca\/blog\/wp-json\/wp\/v2\/tags?post=4985"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}