Frequently Asked Questions

Have Questions? We Have Answers!

Welcome to our FAQ section, where we address common questions about cybersecurity, our services, and how Exploitr can help you enhance your security posture. If you have any additional questions, feel free to contact us directly.

FAQs

What is an Asset?

An asset is any component of your IT environment that has value to your organisation. This includes hardware (servers, routers), software (applications, databases), data (customer information, intellectual property), and even people (employees, contractors). Identifying and managing assets is crucial for effective cybersecurity.

In terms of the Attack Surface Center, assets can be domains, IP addresses, hostnames, subdomains, code repositories, cloud storage, or any other identifiable component that can be scanned or associated with vulnerabilities.

What is an Attack Surface?

An attack surface is the exposed area of a system or network that can be targeted by attackers. It includes all potential entry points, such as software applications, network interfaces, and user accounts. Reducing the attack surface is crucial for improving security.

What is a Vulnerability?

A vulnerability is a flaw or weakness in a system’s design, implementation, or operation that could be exploited by a threat actor to compromise security. Examples include outdated software, misconfigured settings, or weak passwords.

Within the Attack Surface Center platform, vulnerabilities are associated with assets, services, and URLs to provide a complete view of potential security risks. Vulnerabilities can be identified through automated scans, manual testing, or our integrations.

What is Threat Intelligence?

Threat intelligence refers to the collection and analysis of information about current and emerging cyber threats. It helps organisations anticipate, prevent, and respond to attacks by understanding attacker tactics and trends.

What is Penetration Testing?

Penetration testing is a simulated cyberattack performed by security professionals to identify and address vulnerabilities in a system before real attackers can exploit them. It’s a proactive way to strengthen defenses.

If you are looking for penetration testing services, you can find more information on our Penetration Testing services page.

What is an Endpoint?

An endpoint is any device that connects to a network, such as a laptop, smartphone, or server. Endpoints are common targets for cyberattacks, so securing them is crucial for overall network security. User endpoints are commonly targeted by attackers through social engineering, malware, or interception attacks to gain an initial foothold in a network.

What is a Zero-Day?

A zero-day is a newly discovered vulnerability that is unknown to a software vendor and has no available fix. Attackers may exploit zero-days before developers can release a patch, making them highly dangerous and impactful to businesses.

What is a Firewall?

A firewall is a physical security device or software that monitors and controls incoming and outgoing network traffic based on predetermined rules. It acts as a barrier between trusted and untrusted networks, helping prevent unauthorised access.

What is Encryption?

Encryption is the process of converting data into a coded format that can only be read by authorised parties. It protects sensitive information from unauthorised access, both in transit and at rest.

What is the difference between Encryption and Hashing?

Encryption is a reversible process that transforms data from a readable format into an unreadable format, protected by (for example) a key or password. It allows the original data to be secured either in transit or at rest, and can be decrypted back to its original form with the correct encryption key.

Hashing is a one-way process that converts data into a string of characters of a fixed length, known as a hash. It can be used to either verify data integrity (that the data has not been altered) or to securely store data, such as passwords. Hashing is not reversible, and cannot be converted back to the original data. There are techniques that can be used to identify the plaintext (original data) from a hash that are most commonly used to crack passwords through cryptanalysis such as rainbow tables, brute force attacks, mutation or dictionary attacks.

What is Incident Response?

Incident response is the set of procedures an organisation follows to detect, investigate, and recover from cybersecurity incidents. A strong incident response plan helps minimise damage and restore normal operations quickly.

What is Multi-Factor Authentication (MFA)?

Multi-Factor Authentication (MFA, also known as two-factor authentication or 2FA) is a security method that requires users to provide two or more forms of verification before accessing an account or system. This could include something you know (password), something you have (phone), or something you are (fingerprint).