官术网_书友最值得收藏!

Vulnerability

Vulnerability is the term we use to identify a weakness, either in the design, integration, or operation of a system or device. Vulnerabilities are ever present, and countless new ones are discovered every day. Many online databases and web portals now provide us with automated updates on newly discovered vulnerabilities. The following diagram shows the relationships between each of these concepts:

Vulnerabilities may be deficiencies in a device's physical protection (for example, weaknesses in a device's casing, enabling it to be easily tampered with), software quality, configuration, and the suitability of communication protocol selection and implementation for its environment. They can include just about anything in the device, from design implementation deficiencies in the hardware (for example, allowing tampering with FPGA or EEPROM), to internal physical architecture and interfaces, the operating system, or applications. Attackers are well aware of the vulnerability potentials. They will typically seek to unearth the vulnerabilities that are easiest, least costly, or fastest to exploit. Malicious hacking drives a for-profit marketplace of its own in the dark web where malicious hackers value, price, sell, and buy exploits with expected Returns On Investment (ROI). While threat represents the potential for an exploit, vulnerability is the actual target of the exploit from the threat actor.

主站蜘蛛池模板: 班玛县| 云龙县| 泽库县| 广东省| 海南省| 黑河市| 大城县| 顺平县| 元谋县| 蓬溪县| 泰顺县| 清徐县| 梨树县| 西乌| 柳江县| 新河县| 鄄城县| 龙江县| 法库县| 偃师市| 盐山县| 蓝田县| 武隆县| 武夷山市| 合肥市| 方城县| 黔西县| 浠水县| 基隆市| 抚顺市| 科技| 台前县| 温泉县| 松溪县| 土默特左旗| 浮梁县| 黄平县| 黄浦区| 合山市| 南通市| 三穗县|