Difference between revisions of "Vulnerability (computing)"
From Wiki @ Karl Jones dot com
Karl Jones (Talk | contribs) (→See also) |
Karl Jones (Talk | contribs) (→External links) |
||
Line 27: | Line 27: | ||
* [https://en.wikipedia.org/wiki/Vulnerability_(computing) Vulnerability (computing)] @ Wikipedia | * [https://en.wikipedia.org/wiki/Vulnerability_(computing) Vulnerability (computing)] @ Wikipedia | ||
+ | |||
+ | [[Category:Computer science]] | ||
+ | [[Category:Internet security]] |
Revision as of 15:54, 7 April 2016
In computer security, a vulnerability is a weakness which allows an attacker to reduce a system's information assurance.
Description
Vulnerability is the intersection of three elements:
- A system susceptibility or flaw
- Attacker access to the flaw
- And attacker capability to exploit the flaw
Attack surface
To exploit a vulnerability, an attacker must have at least one applicable tool or technique that can connect to a system weakness.
In this frame, vulnerability is also known as the attack surface.
See also
External links
- Vulnerability (computing) @ Wikipedia