- Practical Internet of Things Security
- Brian Russell Drew Van Duren
- 209字
- 2021-06-10 18:42:27
Vulnerability
Vulnerability is the term we use to identify a weakness, either in the design, integration, or operation of a system or device. Vulnerabilities are ever present, and countless new ones are discovered every day. Many online databases and web portals now provide us with automated updates on newly discovered vulnerabilities. The following diagram shows the relationships between each of these concepts:
Vulnerabilities may be deficiencies in a device's physical protection (for example, weaknesses in a device's casing, enabling it to be easily tampered with), software quality, configuration, and the suitability of communication protocol selection and implementation for its environment. They can include just about anything in the device, from design implementation deficiencies in the hardware (for example, allowing tampering with FPGA or EEPROM), to internal physical architecture and interfaces, the operating system, or applications. Attackers are well aware of the vulnerability potentials. They will typically seek to unearth the vulnerabilities that are easiest, least costly, or fastest to exploit. Malicious hacking drives a for-profit marketplace of its own in the dark web where malicious hackers value, price, sell, and buy exploits with expected Returns On Investment (ROI). While threat represents the potential for an exploit, vulnerability is the actual target of the exploit from the threat actor.
- 信息安全導論(在線實驗+在線自測)
- Web漏洞分析與防范實戰:卷1
- Securing Blockchain Networks like Ethereum and Hyperledger Fabric
- Mobile Forensics Cookbook
- Learning Python for Forensics
- 大型互聯網企業安全架構
- 零信任網絡:在不可信網絡中構建安全系統
- 網絡空間安全:管理者讀物
- Getting Started with FortiGate
- 工業物聯網安全
- 解密數據恢復
- 網絡關鍵設備安全檢測實施指南
- 隱私計算:推進數據“可用不可見”的關鍵技術
- 網絡空間安全法律問題研究
- Kali Linux無線網絡滲透測試詳解