Difference between revisions of "Vulnerability (computing)"
From Wiki @ Karl Jones dot com
Karl Jones (Talk | contribs) (→External links) |
Karl Jones (Talk | contribs) (→See also) |
||
(One intermediate revision by the same user not shown) | |||
Line 21: | Line 21: | ||
* [[Computer security]] | * [[Computer security]] | ||
* [[Computing]] | * [[Computing]] | ||
+ | * [[Exploit (computer security)]] | ||
* [[Information assurance]] | * [[Information assurance]] | ||
* [[Security]] | * [[Security]] | ||
+ | * [[Software defect]] | ||
== External links == | == External links == | ||
Line 30: | Line 32: | ||
[[Category:Computer science]] | [[Category:Computer science]] | ||
[[Category:Internet security]] | [[Category:Internet security]] | ||
+ | [[Category:Security]] |
Latest revision as of 04:02, 22 April 2016
In computer security, a vulnerability is a weakness which allows an attacker to reduce a system's information assurance.
Description
Vulnerability is the intersection of three elements:
- A system susceptibility or flaw
- Attacker access to the flaw
- And attacker capability to exploit the flaw
Attack surface
To exploit a vulnerability, an attacker must have at least one applicable tool or technique that can connect to a system weakness.
In this frame, vulnerability is also known as the attack surface.
See also
- Attack surface
- Computer science
- Computer security
- Computing
- Exploit (computer security)
- Information assurance
- Security
- Software defect
External links
- Vulnerability (computing) @ Wikipedia