- Practical Internet of Things Security
- Brian Russell Drew Van Duren
- 209字
- 2021-06-10 18:42:27
Vulnerability
Vulnerability is the term we use to identify a weakness, either in the design, integration, or operation of a system or device. Vulnerabilities are ever present, and countless new ones are discovered every day. Many online databases and web portals now provide us with automated updates on newly discovered vulnerabilities. The following diagram shows the relationships between each of these concepts:
Vulnerabilities may be deficiencies in a device's physical protection (for example, weaknesses in a device's casing, enabling it to be easily tampered with), software quality, configuration, and the suitability of communication protocol selection and implementation for its environment. They can include just about anything in the device, from design implementation deficiencies in the hardware (for example, allowing tampering with FPGA or EEPROM), to internal physical architecture and interfaces, the operating system, or applications. Attackers are well aware of the vulnerability potentials. They will typically seek to unearth the vulnerabilities that are easiest, least costly, or fastest to exploit. Malicious hacking drives a for-profit marketplace of its own in the dark web where malicious hackers value, price, sell, and buy exploits with expected Returns On Investment (ROI). While threat represents the potential for an exploit, vulnerability is the actual target of the exploit from the threat actor.
- 數(shù)據(jù)恢復(fù)方法及案例分析
- Learning Python for Forensics
- 黑客攻防技巧
- 黑客攻防入門秘笈
- Getting Started with FortiGate
- 反黑命令與攻防從新手到高手(微課超值版)
- API攻防:Web API安全指南
- Kali Linux Wireless Penetration Testing Cookbook
- 移動(dòng)APT:威脅情報(bào)分析與數(shù)據(jù)防護(hù)
- 隱私計(jì)算
- 編譯與反編譯技術(shù)實(shí)戰(zhàn)
- Bug Bounty Hunting Essentials
- Cybersecurity Threats,Malware Trends,and Strategies
- 網(wǎng)絡(luò)空間安全實(shí)戰(zhàn)基礎(chǔ)
- 網(wǎng)絡(luò)入侵檢測系統(tǒng)原理與應(yīng)用