Vulnerability Top Ten

by David Schwalenberg
January 29, 2014

This dashboard displays multiple top 10 lists related to network vulnerabilities. Both active (Nessus) and passive (PVS) scan data are used to populate the lists. A list of the top 10 remediations for the network is also shown; implementing the remediations will decrease the vulnerability of the network.

The dashboard and its components are available in the SecurityCenter 4.7 Dashboard app feed, an app store of dashboards, reports, and assets.

The dashboard requirements are:

  • SecurityCenter 4.7
  • Nessus 5.2.4
  • PVS 4.0.0

Listed below are the included components:

Vulnerability Top Ten - Top 10 Remediations
This table displays the top 10 remediations for the network. For each remediation, the risk reduction for the network if the remediation is implemented is shown, along with the number of hosts affected. The list is sorted so that the highest risk reduction is at the top of the list. Implementing the remediations will decrease the vulnerability of the network.

Vulnerability Top Ten - Top 10 Most Vulnerable Hosts
This table displays the 10 hosts on the network that have the greatest number of exploitable critical and high severity vulnerabilities. The list is sorted so that the most vulnerable host is at the top of the list. For each host, a bar graph of its critical and high severity vulnerabilities are shown.

Vulnerability Top Ten - Top 10 Most Vulnerable Networks
This pie chart displays the 10 Class C subnets of the network that have the greatest number of exploitable critical and high severity vulnerabilities on the hosts within that subnet. The most vulnerable subnet will have the largest pie slice

Vulnerability Top Ten - Top 10 Exploitable Vulnerabilities
This table displays the top 10 exploitable vulnerabilities on the network. The list is sorted so that the most critical vulnerability is at the top of the list. For each vulnerability, the severity and the number of hosts affected is shown.

Vulnerability Top Ten - Top 10 Mobile Vulnerabilities
This table displays the top 10 vulnerabilities of mobile devices on the network. The list is sorted so that the most critical vulnerability is at the top of the list. For each vulnerability, the severity and the number of devices affected is shown.

Vulnerability Top Ten - Top 10 Data Leaks
This table displays the top 10 indications of possible data leakage on the network. The list is sorted so that the most critical indication is at the top of the list. For each indication, the severity and the number of hosts affected is shown.