<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How is the threat severity level determined? in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/how-is-the-threat-severity-level-determined/m-p/7655#M5653</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;By threat severity I mean the Critical, High, Medium, Low and informational in the threat prevention table &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 22 Aug 2011 20:34:20 GMT</pubDate>
    <dc:creator>neil_collins</dc:creator>
    <dc:date>2011-08-22T20:34:20Z</dc:date>
    <item>
      <title>How is the threat severity level determined?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-is-the-threat-severity-level-determined/m-p/7653#M5651</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;How is the threat severity level determined?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Critical, High, Medium, Low or Informational&lt;/P&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 22 Aug 2011 17:45:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-is-the-threat-severity-level-determined/m-p/7653#M5651</guid>
      <dc:creator>neil_collins</dc:creator>
      <dc:date>2011-08-22T17:45:13Z</dc:date>
    </item>
    <item>
      <title>Re: How is the threat severity level determined?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-is-the-threat-severity-level-determined/m-p/7654#M5652</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The document at this link contains the matrix for determining threat severity.&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/docs/DOC-1051"&gt;https://live.paloaltonetworks.com/docs/DOC-1051&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 22 Aug 2011 20:25:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-is-the-threat-severity-level-determined/m-p/7654#M5652</guid>
      <dc:creator>nrice</dc:creator>
      <dc:date>2011-08-22T20:25:25Z</dc:date>
    </item>
    <item>
      <title>Re: How is the threat severity level determined?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-is-the-threat-severity-level-determined/m-p/7655#M5653</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;By threat severity I mean the Critical, High, Medium, Low and informational in the threat prevention table &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 22 Aug 2011 20:34:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-is-the-threat-severity-level-determined/m-p/7655#M5653</guid>
      <dc:creator>neil_collins</dc:creator>
      <dc:date>2011-08-22T20:34:20Z</dc:date>
    </item>
    <item>
      <title>Re: How is the threat severity level determined?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-is-the-threat-severity-level-determined/m-p/7656#M5654</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;STRONG&gt;Critical&lt;/STRONG&gt;l vulnerabilities typically affect default installations of widely deployed software, result in root compromise of servers, and the exploit code is widely available to attackers. The attacker usually does not need any special&amp;nbsp; authentication credentials or knowledge about the individual victims and the target does not need to be manipulated into performing any special functions.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;High &lt;/STRONG&gt;vulnerabilities typically have the ability to become critical but have mitigating factors that make them less attractive to attackers. They may be difficult to exploit,.do not result in elevated privileges or do not have a large victim pool.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Moderate&lt;/STRONG&gt;vulnerabilities are those where the scales are tipped in favor of the victim, such as a denial of service attack which does not compromise the target. They include exploits that require an attacker to reside on the same LAN as the victim, affect only non-standard configurations or obscure applications, or the exploitation only provides very limited access.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Low &lt;/STRONG&gt;vulnerabilities typically have very little impact on an organization's infrastructure.&amp;nbsp; They usually require local or physical system access and may often result in victim privacy or DoS issues and information leakage. &lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Informational &lt;/STRONG&gt;vulnerabilities may be suspicious events that are reported to call attention that deeper problems could possibly exist.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 22 Aug 2011 22:09:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-is-the-threat-severity-level-determined/m-p/7656#M5654</guid>
      <dc:creator>nrice</dc:creator>
      <dc:date>2011-08-22T22:09:52Z</dc:date>
    </item>
  </channel>
</rss>

