{"id":210,"date":"2019-01-10T15:00:50","date_gmt":"2019-01-10T21:00:50","guid":{"rendered":"https:\/\/packitforwarding.com\/?p=210"},"modified":"2019-01-08T21:03:50","modified_gmt":"2019-01-09T03:03:50","slug":"comptia-cysa-common-vulnerability-scoring-system-cvss","status":"publish","type":"post","link":"https:\/\/packitforwarding.com\/index.php\/2019\/01\/10\/comptia-cysa-common-vulnerability-scoring-system-cvss\/","title":{"rendered":"CompTIA CySA+ &#8211; Common Vulnerability Scoring System (CVSS)"},"content":{"rendered":"\n<p>The Common Vulnerability Scoring System (CVSS) is part of the <a href=\"https:\/\/packitforwarding.com\/?p=174\">Security Content Automation Protocol (SCAP)<\/a>. It allows security researchers to quantitatively evaluate the risk posed by a vulnerability. CVSS is comprised of three metric groups. The scoring ranges from 0-10. For the purposes of the current version of the exam (as of 1\/1\/2019), CVSS v2 is used.<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>0: No Issues<\/li><li>0.1 to 3.9: Low<\/li><li>4.0 to 6.9: Medium<\/li><li>7.0 to 8.9: High<\/li><li>9.0 to 10.0: Critical<\/li><\/ul>\n\n\n\n<h4 class=\"wp-block-heading\">Base Metric<\/h4>\n\n\n\n<p><strong>Access Vector (AV):<\/strong>  This how a vulnerability can be exploited.<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Local (L)<\/strong>: The attacker must have physical or logical access directly to the system.<\/li><li><strong>Adjacent (A)<\/strong>: The attacker must be on the local network.<\/li><li><strong>Network (N)<\/strong>: The attacker can exploit the vulnerability from any network.<\/li><\/ul>\n\n\n\n<p><strong>Access&nbsp;Complexity&nbsp;(AC):&nbsp;<\/strong>This metric describes the difficulty of exploiting the vulnerability.<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>High&nbsp;(H):<\/strong> The vulnerability requires special conditions that are not easily met.<\/li><li><strong>Medium (M):&nbsp;<\/strong>The vulnerability requires special conditions that are somewhat difficult to meet.<\/li><li><strong>Low (L): <\/strong>The vulnerability doesn&#8217;t require any special conditions to exploit.<\/li><\/ul>\n\n\n\n<p><strong>Authentication (Au):<\/strong> This metric describes how much authentication the attacker needs to exploit the vulnerability.<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Multiple (M)<\/strong>: Two or more authentication mechanisms must be completed to exploit the vulnerability.<\/li><li><strong>Single (S):<\/strong> A single authentication mechanism must be completed to exploit the vulnerability.<\/li><li><strong>None (N):<\/strong> No authentication is necessary to exploit the vulnerability.<\/li><\/ul>\n\n\n\n<p><strong>Confidentiality (C): <\/strong>The level of information disclosure that could occur.<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>None (N):<\/strong> No information disclosure.<\/li><li><strong>Partial (P):<\/strong> Some access to the information.<\/li><li><strong>Complete (C):<\/strong> All information could be compromised.<\/li><\/ul>\n\n\n\n<p><strong>Integrity (I): <\/strong>What type of alteration of data may occur.<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>None (N):<\/strong> No data integrity changes.<\/li><li><strong>Partial (P):<\/strong> Some data integrity may be affected.<\/li><li><strong>Complete (C):<\/strong> All data could be compromised.<\/li><\/ul>\n\n\n\n<p><strong>Availability&nbsp;(A):&nbsp;<\/strong>Describes the impact on system availability that may occur.<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>None (N):<\/strong> No impact on <g class=\"gr_ gr_8 gr-alert gr_gramm gr_inline_cards gr_disable_anim_appear Grammar only-ins replaceWithoutSep\" id=\"8\" data-gr-id=\"8\">availability<\/g> of the system.<\/li><li><strong>Partial (P):<\/strong> Some impact on <g class=\"gr_ gr_7 gr-alert gr_gramm gr_inline_cards gr_disable_anim_appear Grammar only-ins replaceWithoutSep\" id=\"7\" data-gr-id=\"7\">availability<\/g> of the system.<\/li><li><strong>Complete (C):<\/strong> Complete shutdown of the system.<\/li><\/ul>\n\n\n\n<p>The combination of the basic metrics is called the CVSS vector. An example vector is CVSS2#AV:L\/AC:H\/Au:N\/C:P\/I:P\/A:N. NIST provides a <a href=\"https:\/\/nvd.nist.gov\/vuln-metrics\/cvss\/v2-calculator\">calculator<\/a> that will allow for the various basic metrics to be chosen and a CVSS score generated. The calculator also allows the calculation of Temporal and Environmental metrics.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Common Vulnerability Scoring System (CVSS) is part of the Security Content Automation Protocol (SCAP). It allows security researchers to quantitatively evaluate the risk posed by a vulnerability. CVSS is comprised of three metric groups. The scoring ranges from 0-10. For the purposes of the current version of the exam (as of 1\/1\/2019), CVSS v2 [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":349,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"CompTIA CySA+ - Common Vulnerability Scoring System (CVSS) Study Notes #comptia #cysa+ #ciscochampion","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[31,95],"tags":[90,91],"class_list":["post-210","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-certification","category-cysa","tag-certification","tag-cysa"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>CompTIA CySA+ - Common Vulnerability Scoring System (CVSS) -<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/packitforwarding.com\/index.php\/2019\/01\/10\/comptia-cysa-common-vulnerability-scoring-system-cvss\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CompTIA CySA+ - Common Vulnerability Scoring System (CVSS) -\" \/>\n<meta property=\"og:description\" content=\"The Common Vulnerability Scoring System (CVSS) is part of the Security Content Automation Protocol (SCAP). It allows security researchers to quantitatively evaluate the risk posed by a vulnerability. CVSS is comprised of three metric groups. The scoring ranges from 0-10. For the purposes of the current version of the exam (as of 1\/1\/2019), CVSS v2 [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/packitforwarding.com\/index.php\/2019\/01\/10\/comptia-cysa-common-vulnerability-scoring-system-cvss\/\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/packitforwarding\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/packitforwarding\" \/>\n<meta property=\"article:published_time\" content=\"2019-01-10T21:00:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/01\/pexels-photo-1552617.jpeg?fit=640%2C426&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"426\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Ben Story\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@https:\/\/www.twitter.com\/ntwrk80\" \/>\n<meta name=\"twitter:site\" content=\"@ntwrk80\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ben Story\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/index.php\\\/2019\\\/01\\\/10\\\/comptia-cysa-common-vulnerability-scoring-system-cvss\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/index.php\\\/2019\\\/01\\\/10\\\/comptia-cysa-common-vulnerability-scoring-system-cvss\\\/\"},\"author\":{\"name\":\"Ben Story\",\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/#\\\/schema\\\/person\\\/441c2562293c45fbcf483f246430e6c8\"},\"headline\":\"CompTIA CySA+ &#8211; Common Vulnerability Scoring System (CVSS)\",\"datePublished\":\"2019-01-10T21:00:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/index.php\\\/2019\\\/01\\\/10\\\/comptia-cysa-common-vulnerability-scoring-system-cvss\\\/\"},\"wordCount\":383,\"commentCount\":3,\"publisher\":{\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/#\\\/schema\\\/person\\\/441c2562293c45fbcf483f246430e6c8\"},\"image\":{\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/index.php\\\/2019\\\/01\\\/10\\\/comptia-cysa-common-vulnerability-scoring-system-cvss\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/packitforwarding.com\\\/wp-content\\\/uploads\\\/2019\\\/01\\\/pexels-photo-1552617.jpeg?fit=640%2C426&ssl=1\",\"keywords\":[\"certification\",\"cysa+\"],\"articleSection\":[\"Certification\",\"CySA+\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/packitforwarding.com\\\/index.php\\\/2019\\\/01\\\/10\\\/comptia-cysa-common-vulnerability-scoring-system-cvss\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/index.php\\\/2019\\\/01\\\/10\\\/comptia-cysa-common-vulnerability-scoring-system-cvss\\\/\",\"url\":\"https:\\\/\\\/packitforwarding.com\\\/index.php\\\/2019\\\/01\\\/10\\\/comptia-cysa-common-vulnerability-scoring-system-cvss\\\/\",\"name\":\"CompTIA CySA+ - Common Vulnerability Scoring System (CVSS) -\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/index.php\\\/2019\\\/01\\\/10\\\/comptia-cysa-common-vulnerability-scoring-system-cvss\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/index.php\\\/2019\\\/01\\\/10\\\/comptia-cysa-common-vulnerability-scoring-system-cvss\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/packitforwarding.com\\\/wp-content\\\/uploads\\\/2019\\\/01\\\/pexels-photo-1552617.jpeg?fit=640%2C426&ssl=1\",\"datePublished\":\"2019-01-10T21:00:50+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/index.php\\\/2019\\\/01\\\/10\\\/comptia-cysa-common-vulnerability-scoring-system-cvss\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/packitforwarding.com\\\/index.php\\\/2019\\\/01\\\/10\\\/comptia-cysa-common-vulnerability-scoring-system-cvss\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/index.php\\\/2019\\\/01\\\/10\\\/comptia-cysa-common-vulnerability-scoring-system-cvss\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/packitforwarding.com\\\/wp-content\\\/uploads\\\/2019\\\/01\\\/pexels-photo-1552617.jpeg?fit=640%2C426&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/packitforwarding.com\\\/wp-content\\\/uploads\\\/2019\\\/01\\\/pexels-photo-1552617.jpeg?fit=640%2C426&ssl=1\",\"width\":640,\"height\":426,\"caption\":\"Photo by Engin Akyurt from Pexels\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/index.php\\\/2019\\\/01\\\/10\\\/comptia-cysa-common-vulnerability-scoring-system-cvss\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/packitforwarding.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CompTIA CySA+ &#8211; Common Vulnerability Scoring System (CVSS)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/#website\",\"url\":\"https:\\\/\\\/packitforwarding.com\\\/\",\"name\":\"\",\"description\":\"Paying it forward to the next generation of IT.\",\"publisher\":{\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/#\\\/schema\\\/person\\\/441c2562293c45fbcf483f246430e6c8\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/packitforwarding.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/#\\\/schema\\\/person\\\/441c2562293c45fbcf483f246430e6c8\",\"name\":\"Ben Story\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/i0.wp.com\\\/packitforwarding.com\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/cropped-PIF_Logo-Color-Horizontal-Rounded-1.png?fit=489%2C250&ssl=1\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/packitforwarding.com\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/cropped-PIF_Logo-Color-Horizontal-Rounded-1.png?fit=489%2C250&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/packitforwarding.com\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/cropped-PIF_Logo-Color-Horizontal-Rounded-1.png?fit=489%2C250&ssl=1\",\"width\":489,\"height\":250,\"caption\":\"Ben Story\"},\"logo\":{\"@id\":\"https:\\\/\\\/i0.wp.com\\\/packitforwarding.com\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/cropped-PIF_Logo-Color-Horizontal-Rounded-1.png?fit=489%2C250&ssl=1\"},\"description\":\"In the course of my career, I have had the pleasure of working in multiple verticals including Education, Logistics and Healthcare. Although I started as a systems administrator (aka server jockey), I am now firmly in the network engineering arena. Currently I am working for a multi-state hospital system.\",\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/packitforwarding\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/benstory\",\"https:\\\/\\\/x.com\\\/https:\\\/\\\/www.twitter.com\\\/ntwrk80\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CompTIA CySA+ - Common Vulnerability Scoring System (CVSS) -","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/packitforwarding.com\/index.php\/2019\/01\/10\/comptia-cysa-common-vulnerability-scoring-system-cvss\/","og_locale":"en_US","og_type":"article","og_title":"CompTIA CySA+ - Common Vulnerability Scoring System (CVSS) -","og_description":"The Common Vulnerability Scoring System (CVSS) is part of the Security Content Automation Protocol (SCAP). It allows security researchers to quantitatively evaluate the risk posed by a vulnerability. CVSS is comprised of three metric groups. The scoring ranges from 0-10. For the purposes of the current version of the exam (as of 1\/1\/2019), CVSS v2 [&hellip;]","og_url":"https:\/\/packitforwarding.com\/index.php\/2019\/01\/10\/comptia-cysa-common-vulnerability-scoring-system-cvss\/","article_publisher":"https:\/\/www.facebook.com\/packitforwarding","article_author":"https:\/\/www.facebook.com\/packitforwarding","article_published_time":"2019-01-10T21:00:50+00:00","og_image":[{"width":640,"height":426,"url":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/01\/pexels-photo-1552617.jpeg?fit=640%2C426&ssl=1","type":"image\/jpeg"}],"author":"Ben Story","twitter_card":"summary_large_image","twitter_creator":"@https:\/\/www.twitter.com\/ntwrk80","twitter_site":"@ntwrk80","twitter_misc":{"Written by":"Ben Story","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/packitforwarding.com\/index.php\/2019\/01\/10\/comptia-cysa-common-vulnerability-scoring-system-cvss\/#article","isPartOf":{"@id":"https:\/\/packitforwarding.com\/index.php\/2019\/01\/10\/comptia-cysa-common-vulnerability-scoring-system-cvss\/"},"author":{"name":"Ben Story","@id":"https:\/\/packitforwarding.com\/#\/schema\/person\/441c2562293c45fbcf483f246430e6c8"},"headline":"CompTIA CySA+ &#8211; Common Vulnerability Scoring System (CVSS)","datePublished":"2019-01-10T21:00:50+00:00","mainEntityOfPage":{"@id":"https:\/\/packitforwarding.com\/index.php\/2019\/01\/10\/comptia-cysa-common-vulnerability-scoring-system-cvss\/"},"wordCount":383,"commentCount":3,"publisher":{"@id":"https:\/\/packitforwarding.com\/#\/schema\/person\/441c2562293c45fbcf483f246430e6c8"},"image":{"@id":"https:\/\/packitforwarding.com\/index.php\/2019\/01\/10\/comptia-cysa-common-vulnerability-scoring-system-cvss\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/01\/pexels-photo-1552617.jpeg?fit=640%2C426&ssl=1","keywords":["certification","cysa+"],"articleSection":["Certification","CySA+"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/packitforwarding.com\/index.php\/2019\/01\/10\/comptia-cysa-common-vulnerability-scoring-system-cvss\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/packitforwarding.com\/index.php\/2019\/01\/10\/comptia-cysa-common-vulnerability-scoring-system-cvss\/","url":"https:\/\/packitforwarding.com\/index.php\/2019\/01\/10\/comptia-cysa-common-vulnerability-scoring-system-cvss\/","name":"CompTIA CySA+ - Common Vulnerability Scoring System (CVSS) -","isPartOf":{"@id":"https:\/\/packitforwarding.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/packitforwarding.com\/index.php\/2019\/01\/10\/comptia-cysa-common-vulnerability-scoring-system-cvss\/#primaryimage"},"image":{"@id":"https:\/\/packitforwarding.com\/index.php\/2019\/01\/10\/comptia-cysa-common-vulnerability-scoring-system-cvss\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/01\/pexels-photo-1552617.jpeg?fit=640%2C426&ssl=1","datePublished":"2019-01-10T21:00:50+00:00","breadcrumb":{"@id":"https:\/\/packitforwarding.com\/index.php\/2019\/01\/10\/comptia-cysa-common-vulnerability-scoring-system-cvss\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/packitforwarding.com\/index.php\/2019\/01\/10\/comptia-cysa-common-vulnerability-scoring-system-cvss\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/packitforwarding.com\/index.php\/2019\/01\/10\/comptia-cysa-common-vulnerability-scoring-system-cvss\/#primaryimage","url":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/01\/pexels-photo-1552617.jpeg?fit=640%2C426&ssl=1","contentUrl":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/01\/pexels-photo-1552617.jpeg?fit=640%2C426&ssl=1","width":640,"height":426,"caption":"Photo by Engin Akyurt from Pexels"},{"@type":"BreadcrumbList","@id":"https:\/\/packitforwarding.com\/index.php\/2019\/01\/10\/comptia-cysa-common-vulnerability-scoring-system-cvss\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/packitforwarding.com\/"},{"@type":"ListItem","position":2,"name":"CompTIA CySA+ &#8211; Common Vulnerability Scoring System (CVSS)"}]},{"@type":"WebSite","@id":"https:\/\/packitforwarding.com\/#website","url":"https:\/\/packitforwarding.com\/","name":"","description":"Paying it forward to the next generation of IT.","publisher":{"@id":"https:\/\/packitforwarding.com\/#\/schema\/person\/441c2562293c45fbcf483f246430e6c8"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/packitforwarding.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":["Person","Organization"],"@id":"https:\/\/packitforwarding.com\/#\/schema\/person\/441c2562293c45fbcf483f246430e6c8","name":"Ben Story","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2026\/02\/cropped-PIF_Logo-Color-Horizontal-Rounded-1.png?fit=489%2C250&ssl=1","url":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2026\/02\/cropped-PIF_Logo-Color-Horizontal-Rounded-1.png?fit=489%2C250&ssl=1","contentUrl":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2026\/02\/cropped-PIF_Logo-Color-Horizontal-Rounded-1.png?fit=489%2C250&ssl=1","width":489,"height":250,"caption":"Ben Story"},"logo":{"@id":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2026\/02\/cropped-PIF_Logo-Color-Horizontal-Rounded-1.png?fit=489%2C250&ssl=1"},"description":"In the course of my career, I have had the pleasure of working in multiple verticals including Education, Logistics and Healthcare. Although I started as a systems administrator (aka server jockey), I am now firmly in the network engineering arena. Currently I am working for a multi-state hospital system.","sameAs":["https:\/\/www.facebook.com\/packitforwarding","https:\/\/www.linkedin.com\/in\/benstory","https:\/\/x.com\/https:\/\/www.twitter.com\/ntwrk80"]}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/01\/pexels-photo-1552617.jpeg?fit=640%2C426&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pay9MD-3o","jetpack-related-posts":[{"id":174,"url":"https:\/\/packitforwarding.com\/index.php\/2019\/01\/10\/comptia-cysa-security-content-automation-protocol-scap\/","url_meta":{"origin":210,"position":0},"title":"CompTIA CySA+ &#8211; Security Content Automation Protocol (SCAP)","author":"Ben Story","date":"January 10, 2019","format":false,"excerpt":"The Security Content Automation Protocol (SCAP) is a standard that defines how software flaws and configuration errors are classified. Four components make up SCAP. Common Configuration Enumeration (CCE) The Common Configuration Enumeration (CCE) is a list of best practices maintained by the National Institute of Standards and Technology (NIST). They\u2026","rel":"","context":"In &quot;Certification&quot;","block_context":{"text":"Certification","link":"https:\/\/packitforwarding.com\/index.php\/category\/certification\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2018\/12\/pexels-photo-1173735.jpeg?fit=640%2C640&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2018\/12\/pexels-photo-1173735.jpeg?fit=640%2C640&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2018\/12\/pexels-photo-1173735.jpeg?fit=640%2C640&ssl=1&resize=525%2C300 1.5x"},"classes":[]},{"id":737,"url":"https:\/\/packitforwarding.com\/index.php\/2019\/07\/31\/ccna-cyberops-secops-objective-1-2\/","url_meta":{"origin":210,"position":1},"title":"CCNA CyberOps SECOPS &#8211; Objective 1.2","author":"Ben Story","date":"July 31, 2019","format":false,"excerpt":"Describe these terms as they are defined in the CVSS 3.0: Attack Vector, Attack Complexity, Privileges Required, User Interaction, Scope Implementing Cisco Cybersecurity Operations (210-255) The CVSS Base Metrics are defined by the terms Attack Vector, Attack Complexity, Privileges Required, User Interaction, and Scope. Attack Vector The attack vector (AV)\u2026","rel":"","context":"In &quot;Blog&quot;","block_context":{"text":"Blog","link":"https:\/\/packitforwarding.com\/index.php\/category\/blog\/"},"img":{"alt_text":"concentric windows lit up in circles","src":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/07\/art-background-bright-285174.jpg?fit=640%2C465&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/07\/art-background-bright-285174.jpg?fit=640%2C465&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/07\/art-background-bright-285174.jpg?fit=640%2C465&ssl=1&resize=525%2C300 1.5x"},"classes":[]},{"id":741,"url":"https:\/\/packitforwarding.com\/index.php\/2019\/08\/02\/ccna-cyberops-secops-objective-1-3\/","url_meta":{"origin":210,"position":2},"title":"CCNA CyberOps SECOPS &#8211; Objective 1.3","author":"Ben Story","date":"August 2, 2019","format":false,"excerpt":"Describe these terms as they are defined in the CVSS 3.0: Confidentiality, Integrity and Availability Implementing Cisco Cybersecurity Operations (210-255) The three metrics Confidentiality, Integrity, and Availability are often referred to as the cybersecurity triad. In terms of CVSS, they are referred to as the impact metrics. Confidentiality Confidentiality measures\u2026","rel":"","context":"In &quot;Blog&quot;","block_context":{"text":"Blog","link":"https:\/\/packitforwarding.com\/index.php\/category\/blog\/"},"img":{"alt_text":"Photo by byMALENS from Pexels","src":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/07\/art-artistic-blue-2157805.jpg?fit=640%2C647&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/07\/art-artistic-blue-2157805.jpg?fit=640%2C647&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/07\/art-artistic-blue-2157805.jpg?fit=640%2C647&ssl=1&resize=525%2C300 1.5x"},"classes":[]},{"id":165,"url":"https:\/\/packitforwarding.com\/index.php\/2019\/01\/14\/comptia-cysa-objective-2-2\/","url_meta":{"origin":210,"position":3},"title":"CompTIA CySA+ Objective 2.2","author":"Ben Story","date":"January 14, 2019","format":false,"excerpt":"Given a scenario, analyze the output resulting from a vulnerability scan.CompTIA Cybersecurity Analyst (CySA+) Certification Exam Objectives Version 3.0 Analyze Reports from a Vulnerability Scan The data from a vulnerability scan must be interpreted and analyzed to turn it into usable and actionable information.\u00a0 One of the first parts of\u2026","rel":"","context":"In &quot;Blog&quot;","block_context":{"text":"Blog","link":"https:\/\/packitforwarding.com\/index.php\/category\/blog\/"},"img":{"alt_text":"Microscope","src":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/01\/pexels-photo-256262.jpeg?fit=640%2C424&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/01\/pexels-photo-256262.jpeg?fit=640%2C424&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/01\/pexels-photo-256262.jpeg?fit=640%2C424&ssl=1&resize=525%2C300 1.5x"},"classes":[]},{"id":555,"url":"https:\/\/packitforwarding.com\/index.php\/2019\/04\/08\/ccna-cyberops-secfnd-objective-6-8\/","url_meta":{"origin":210,"position":4},"title":"CCNA CyberOps SECFND Objective 6.8","author":"Ben Story","date":"April 8, 2019","format":false,"excerpt":"Compare and contrast remote exploit and a local exploitUnderstanding Cisco Cybersecurity Fundamentals (210-250) As noted in the CVSS metrics, there are two types of exploits, those that can be done remotely and those that require local access to complete. Remote exploits can be accomplished over the network and do not\u2026","rel":"","context":"In &quot;Blog&quot;","block_context":{"text":"Blog","link":"https:\/\/packitforwarding.com\/index.php\/category\/blog\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/04\/access-black-and-white-blur-270514.jpg?fit=640%2C432&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/04\/access-black-and-white-blur-270514.jpg?fit=640%2C432&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/04\/access-black-and-white-blur-270514.jpg?fit=640%2C432&ssl=1&resize=525%2C300 1.5x"},"classes":[]},{"id":164,"url":"https:\/\/packitforwarding.com\/index.php\/2019\/01\/12\/comptia-cysa-objective-2-1\/","url_meta":{"origin":210,"position":5},"title":"CompTIA CySA+ Objective 2.1","author":"Ben Story","date":"January 12, 2019","format":false,"excerpt":"Given a scenario, implement an information security vulnerability management process.CompTIA Cybersecurity Analyst (CySA+) Certification Exam Objectives Version 3.0 Identification of Requirements One of the key parts of managing vulnerabilities is knowing what the enterprise is trying to achieve.\u00a0 The first set of requirements often come from regulatory bodies.\u00a0 Some of\u2026","rel":"","context":"In &quot;Blog&quot;","block_context":{"text":"Blog","link":"https:\/\/packitforwarding.com\/index.php\/category\/blog\/"},"img":{"alt_text":"Photo by Lex Photography from Pexels","src":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2018\/10\/pexels-photo-1109541.jpeg?fit=640%2C426&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2018\/10\/pexels-photo-1109541.jpeg?fit=640%2C426&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2018\/10\/pexels-photo-1109541.jpeg?fit=640%2C426&ssl=1&resize=525%2C300 1.5x"},"classes":[]}],"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/packitforwarding.com\/index.php\/wp-json\/wp\/v2\/posts\/210","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/packitforwarding.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/packitforwarding.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/packitforwarding.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/packitforwarding.com\/index.php\/wp-json\/wp\/v2\/comments?post=210"}],"version-history":[{"count":0,"href":"https:\/\/packitforwarding.com\/index.php\/wp-json\/wp\/v2\/posts\/210\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/packitforwarding.com\/index.php\/wp-json\/wp\/v2\/media\/349"}],"wp:attachment":[{"href":"https:\/\/packitforwarding.com\/index.php\/wp-json\/wp\/v2\/media?parent=210"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/packitforwarding.com\/index.php\/wp-json\/wp\/v2\/categories?post=210"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/packitforwarding.com\/index.php\/wp-json\/wp\/v2\/tags?post=210"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}