Difference between revisions of "Vulnerability (computing)"

From Wiki @ Karl Jones dot com
Jump to: navigation, search
(External links)
(See also)
 
(One intermediate revision by the same user not shown)
Line 21: Line 21:
 
* [[Computer security]]
 
* [[Computer security]]
 
* [[Computing]]
 
* [[Computing]]
 +
* [[Exploit (computer security)]]
 
* [[Information assurance]]
 
* [[Information assurance]]
 
* [[Security]]
 
* [[Security]]
 +
* [[Software defect]]
  
 
==  External links ==
 
==  External links ==
Line 30: Line 32:
 
[[Category:Computer science]]
 
[[Category:Computer science]]
 
[[Category:Internet security]]
 
[[Category:Internet security]]
 +
[[Category:Security]]

Latest revision as of 04:02, 22 April 2016

In computer security, a vulnerability is a weakness which allows an attacker to reduce a system's information assurance.

Description

Vulnerability is the intersection of three elements:

  • A system susceptibility or flaw
  • Attacker access to the flaw
  • And attacker capability to exploit the flaw

Attack surface

To exploit a vulnerability, an attacker must have at least one applicable tool or technique that can connect to a system weakness.

In this frame, vulnerability is also known as the attack surface.

See also

External links