Jericho Security | Glossary

Jericho’s Cybersecurity Glossary | Access Complexity

Written by Jericho Security Team | Sep 27, 2024 4:02:20 PM

Definition:

Access complexity refers to the difficulty involved in exploiting a vulnerability to gain unauthorized access (by an attacker). It can be categorized as low, medium, or high, depending on the level of skill, resources, and tools required to carry out the exploitation.

Use Cases:

  • Used in vulnerability scoring systems like CVSS (Common Vulnerability Scoring System) to assess the severity of vulnerabilities.
  • Organizations assess potential threats based on how easily an attacker could exploit a vulnerability.

Related Terms:

Questions and Answers:

  • How is access complexity measured in cybersecurity frameworks?
    Access complexity is measured by evaluating the technical skills, time, and resources an attacker needs to exploit a vulnerability. An example would be the user interaction required to open a phishing email containing a malicious toolkit. As attackers may not have direct control over users in determining whether they open the phishing email or not, the access complexity is determined to be higher. 

  • What types of vulnerabilities are considered low-complexity?
    Low-complexity vulnerabilities are those that require minimal skill and readily available tools to exploit, such as misconfigured access permissions.

  • Why is access complexity important in threat prioritization?
    Understanding access complexity helps prioritize high-risk vulnerabilities that are easy to exploit, enabling teams to address the most pressing threats first.