官术网_书友最值得收藏!

Vulnerability

Vulnerability is the term we use to identify a weakness, either in the design, integration, or operation of a system or device. Vulnerabilities are ever present, and countless new ones are discovered every day. Many online databases and web portals now provide us with automated updates on newly discovered vulnerabilities. The following diagram shows the relationships between each of these concepts:

Vulnerabilities may be deficiencies in a device's physical protection (for example, weaknesses in a device's casing, enabling it to be easily tampered with), software quality, configuration, and the suitability of communication protocol selection and implementation for its environment. They can include just about anything in the device, from design implementation deficiencies in the hardware (for example, allowing tampering with FPGA or EEPROM), to internal physical architecture and interfaces, the operating system, or applications. Attackers are well aware of the vulnerability potentials. They will typically seek to unearth the vulnerabilities that are easiest, least costly, or fastest to exploit. Malicious hacking drives a for-profit marketplace of its own in the dark web where malicious hackers value, price, sell, and buy exploits with expected Returns On Investment (ROI). While threat represents the potential for an exploit, vulnerability is the actual target of the exploit from the threat actor.

主站蜘蛛池模板: 萨迦县| 河北省| 民和| 晴隆县| 抚顺市| 东源县| 泾阳县| 茶陵县| 遂宁市| 洪雅县| 通江县| 封开县| 筠连县| 常山县| 舒兰市| 襄垣县| 共和县| 蒲江县| 新密市| 宁阳县| 安吉县| 疏勒县| 勃利县| 都匀市| 栾城县| 武平县| 连南| 泸水县| 桓台县| 桃园市| 黄梅县| 班戈县| 伊川县| 德钦县| 阿鲁科尔沁旗| 嵊州市| 荣成市| 衡南县| 武川县| 横峰县| 汶川县|