Vulnerabilities are operating system and application defects that enable attackers to remotely exploit systems. An exploit is software that takes advantage of Security vulnerabilities to compromise a system.
Detection gap - This is the time between actual breach and discovery: have we been breached?
Response gap - This is the time between discovery to remediation to limit damage: how bad is it?
Prevention gap - This is the time to put preventative measures in place to avoid future attacks: can we avoid this from happening again?
Could be prevented by remediating known vulnerabilities
You should focus your remediation efforts on the highest risks and the most critical assets.
Detection - Targeted threat detection, Zero-day, APT detection, exfiltration detection, threat analytics.
Response - Rapid investigation, prioritize and respond, automate or manually isolate and remediate, forensics.
Prevention - Control, monitor and adjust, harden and reconfigure, reduce threat surface.