A Quick Look at Computer Security Vulnerabilities

When it comes to computer security there is really one thing that matters: vulnerabilities.  The quality of your Hikvision device’s security depends only upon how much vulnerability it has that can be exploited. As the old adage goes: “A chain is only as strong as its weakest link.”

Indeed, it does not matter how many threats your computer’s security can defend against; if it cannot defend against them all.

Of course, at the same time, cyber criminals are always out there doing everything they can to find and exploit vulnerabilities. That means that what might have been a perfect infrastructure only a few years ago could be obsolete tomorrow; and that is why we need so many potential nvr back door updates.


Technically, computer security vulnerability is the intersection of three related elements:

  • System susceptibility (flaw)
  • An attacker with access to this flaw
  • An attacker’s capability to exploit this flaw

Basically, you need a known flaw and someone who has the tools and the access to the flaw so they can exploit it. It is important to note that security risks are not necessarily the same thing as vulnerabilities.  Some vulnerability do not inherently pose or possess a risk, necessarily, they are exploitable while others would have no asset if they were exploited.


The types of computer security vulnerabilities you can encounter are seemingly endless.  Essentially you can classify vulnerabilities according to hardware:

  • Susceptible to humidity
  • Susceptible to dust
  • Susceptible to soiling
  • Susceptible to storage (if unprotected)

Or software:

  • Lack of an audit trail
  • Insufficient testing (of hardware, software, service, etc)
  • Inherent design flaws

Or the Network:

  • Unprotected communication lines (because they are easy to exploit)
  • An insecure network architecture

Or Personnel:

  • Inadequate recruiting/hiring
  • Inadequate awareness of security

Or Physical site issues:

  • An area which is subject to flooding
  • An area with an unreliable power source

Or organizational in nature:

  • The lack of regular audits
  • The lack of continuity plans
  • The lack of overall security


Many things can cause computer security vulnerabilities. While the human user/operator/designer is generally the most vulnerable point in any information system, other computer security vulnerability causes can include things like:

  • Complexity
  • Familiarity
  • Connectivity
  • Password management
  • Basic operating system infrastructure design flaws
  • Internet website browsing issues
  • Software bugs
  • An unchecked user input
  • Repeating old mistakes (where you may have been previously exposed to computer security vulnerabilities)