官术网_书友最值得收藏!

Vulnerability

Vulnerability is the term we use to identify a weakness, either in the design, integration, or operation of a system or device. Vulnerabilities are ever present, and countless new ones are discovered every day. Many online databases and web portals now provide us with automated updates on newly discovered vulnerabilities. The following diagram shows the relationships between each of these concepts:

Vulnerabilities may be deficiencies in a device's physical protection (for example, weaknesses in a device's casing, enabling it to be easily tampered with), software quality, configuration, and the suitability of communication protocol selection and implementation for its environment. They can include just about anything in the device, from design implementation deficiencies in the hardware (for example, allowing tampering with FPGA or EEPROM), to internal physical architecture and interfaces, the operating system, or applications. Attackers are well aware of the vulnerability potentials. They will typically seek to unearth the vulnerabilities that are easiest, least costly, or fastest to exploit. Malicious hacking drives a for-profit marketplace of its own in the dark web where malicious hackers value, price, sell, and buy exploits with expected Returns On Investment (ROI). While threat represents the potential for an exploit, vulnerability is the actual target of the exploit from the threat actor.

主站蜘蛛池模板: 伊春市| 上高县| 牟定县| 汉川市| 水城县| 竹山县| 嘉善县| 泰宁县| 昭觉县| 镇巴县| 华容县| 肥乡县| 台湾省| 武胜县| 福州市| 准格尔旗| 高雄县| 远安县| 喀什市| 兴国县| 屏东县| 成武县| 乐亭县| 吉林省| 阳江市| 宣化县| 阿巴嘎旗| 京山县| 张家界市| 原平市| 桐城市| 绵竹市| 米林县| 武乡县| 峡江县| 巢湖市| 雷山县| 定边县| 丹江口市| 四川省| 元氏县|