expand for answer

Vulnerability

A weakness in a system that can be exploited to violate the system’s intended behavior relative to safety, security, reliability, availability, integrity, etc. A weakness. It can be due to the existence of a flaw, loophole, oversight, error, limitation, frailty, or susceptibility in the IT infrastructure or any other aspect of an organization. It can also be the result of the absence of a safeguard or countermeasure or a weakness in a protection measure. Weakness in an information system, system security procedures, internal controls, or implementation that could be exploited.


Similar items:
1. Protection included to counteract a known or expected condition. 2. Incorporated countermeasure or set of countermeasures within a base release. Anything that removes a vulnerability or protects against one or more specific threats. Also referred to as a countermeasure.
[view]
Error of commission, omission, or oversight in an information system that may allow protection mechanisms to be bypassed.
[view]
System analysis and penetration technique in which the specification and documentation for an information system are analyzed to produce a list of hypothetical flaws. This list is prioritized on the basis of the estimated probability that a flaw exists, on the ease of exploiting it, and on the extent of control or compromise it would provide. The prioritized list is used to perform penetration testing of a system.
[view]
An error of omission or oversight in software, hardware, or firmware that permits circumventing the access control process.
[view]
A test performed on a system to find weaknesses in the security infrastructure. Vulnerability scans automatically probe systems, applications, and networks looking for weaknesses that may be exploited by an attacker. The scanning tools used in these tests provide quick point-and-click tests that perform otherwise tedious tasks without requiring manual intervention.
[view]


There are no comments yet.

Authentication required

You must log in to post a comment.

Log in