Final answer:
Characteristics used to assess the severity of found vulnerabilities include whether they are remotely exploitable, the type of access gained, the use of encryption, and the chance of exploitation.
Step-by-step explanation:
When assessing the severity of found vulnerabilities, several characteristics are considered:
- Remotely exploitable or not: This refers to whether the vulnerability can be exploited from a remote location or if physical access to the system is required.
- Type of access gained: This refers to the level of access that an attacker can gain if the vulnerability is exploited, such as read-only access or administrative privileges.
- Use of encryption or not: This refers to whether the vulnerability can be mitigated by using encryption to protect sensitive data.
- Chance of exploitation: This refers to the likelihood that the vulnerability will be actively exploited by attackers, based on factors such as the popularity of the vulnerable software or the value of the data that can be accessed.