Difference between revisions of "Vulnerability (computing)"
From Wiki @ Karl Jones dot com
Karl Jones (Talk | contribs) (Created page with "In computer security, a '''vulnerability''' is a weakness which allows an attacker to reduce a system's information assurance. == Description == Vulnerability is the...") |
Karl Jones (Talk | contribs) (→See also) |
||
(3 intermediate revisions by the same user not shown) | |||
Line 18: | Line 18: | ||
* [[Attack surface]] | * [[Attack surface]] | ||
+ | * [[Computer science]] | ||
* [[Computer security]] | * [[Computer security]] | ||
+ | * [[Computing]] | ||
+ | * [[Exploit (computer security)]] | ||
* [[Information assurance]] | * [[Information assurance]] | ||
* [[Security]] | * [[Security]] | ||
+ | * [[Software defect]] | ||
== External links == | == External links == | ||
* [https://en.wikipedia.org/wiki/Vulnerability_(computing) Vulnerability (computing)] @ Wikipedia | * [https://en.wikipedia.org/wiki/Vulnerability_(computing) Vulnerability (computing)] @ Wikipedia | ||
+ | |||
+ | [[Category:Computer science]] | ||
+ | [[Category:Internet security]] | ||
+ | [[Category:Security]] |
Latest revision as of 04:02, 22 April 2016
In computer security, a vulnerability is a weakness which allows an attacker to reduce a system's information assurance.
Description
Vulnerability is the intersection of three elements:
- A system susceptibility or flaw
- Attacker access to the flaw
- And attacker capability to exploit the flaw
Attack surface
To exploit a vulnerability, an attacker must have at least one applicable tool or technique that can connect to a system weakness.
In this frame, vulnerability is also known as the attack surface.
See also
- Attack surface
- Computer science
- Computer security
- Computing
- Exploit (computer security)
- Information assurance
- Security
- Software defect
External links
- Vulnerability (computing) @ Wikipedia