Difference between revisions of "Vulnerability (computing)"
From Wiki @ Karl Jones dot com
Karl Jones (Talk | contribs) (→External links) |
Karl Jones (Talk | contribs) (→External links) |
||
Line 30: | Line 30: | ||
[[Category:Computer science]] | [[Category:Computer science]] | ||
[[Category:Internet security]] | [[Category:Internet security]] | ||
+ | [[Category:Security]] |
Revision as of 03:58, 22 April 2016
In computer security, a vulnerability is a weakness which allows an attacker to reduce a system's information assurance.
Description
Vulnerability is the intersection of three elements:
- A system susceptibility or flaw
- Attacker access to the flaw
- And attacker capability to exploit the flaw
Attack surface
To exploit a vulnerability, an attacker must have at least one applicable tool or technique that can connect to a system weakness.
In this frame, vulnerability is also known as the attack surface.
See also
External links
- Vulnerability (computing) @ Wikipedia