expand for answer

Loophole

An error of omission or oversight in software, hardware, or firmware that permits circumventing the access control process.


Similar items:
Failures that result from an error of omission, error of commission, or operational error during a lifecycle activity.
[view]
Error of commission, omission, or oversight in an information system that may allow protection mechanisms to be bypassed.
[view]
An attack that can be perpetrated by circumventing or nullifying hardware, software, and firmware access control mechanisms rather than by subverting system personnel or other users.
[view]
Hardware, firmware, and software elements of a trusted computing base implementing the reference monitor concept. Security kernel must mediate all accesses, be protected from modification, and be verifiable as correct. The central part of a computer system (hardware, software, or firmware) that implements the fundamental security procedures for controlling access to system resources. The core set of operating system services that handles all user/application requests for access to system resources.
[view]
Process of controlling modifications to hardware, firmware, software, and documentation to ensure the information system is protected against improper modifications prior to, during, and after system implementation. The process of controlling modifications to the system’s hardware, firmware, software, and documentation that provides sufficient assurance that the system is protected against the introduction
[view]


There are no comments yet.

Authentication required

You must log in to post a comment.

Log in