TITLE

known vulnerability

PUB. DATE
April 2016
SOURCE
Computer Desktop Encyclopedia;Apr2016, p1
SOURCE TYPE
Encyclopedia
DOC. TYPE
Reference Entry
ABSTRACT
A bug in software that has been identified. It typically refers to bugs that have been used for malicious purposes. For example, bugs in Web server, Web browser and e-mail client software are widely exploited by attackers. Although vendors generally issue patches, there is no guarantee that all users will apply them.
ACCESSION #
114224774

 

Related Articles

  • BRIDGE. PETER DONOVAN // Daily Mail;12/12/2016, p40 

    Vulnerable

  • BRIDGE MASTERCLASS. PETER DONOVAN // Daily Mail;12/12/2016, p58 

    Vulnerable

  • BRIDGE MASTERCLASS. PETER DONOVAN // Daily Mail;12/12/2016, p58 

    Vulnerable

  • Crimeware packs. Carey, Marcus // SC Magazine: For IT Security Professionals (15476693);Jun2012, Vol. 23 Issue 6, p13 

    The article offers information on the Crimeware packs, software known as mass malware packs designed to exploit vulnerabilities on the internet.

  • CVE.  // Computer Desktop Encyclopedia;2015, p1 

    (Common Vulnerabilities and Exposures) A list of information security exposures and vulnerabilities sponsored by US-CERT and maintained by the MITRE Corporation. The CVE mission is to provide standard names for all publicly known security exposures as wel

  • Vulnerability Scanning.  // Network Dictionary;2007, p520 

    An encyclopedia entry for "Vulnerability Scanning" in computer security is presented. It refers to the process of using some software or hardware tools to identify vulnerabilities of computing systems in a network in order to determine if and where a system can be exploited and/or threatened....

  • A New Model for Secure Software Development. Shirazi, H. M. // International Journal of Intelligent Information Technology Appl;Jun2009, Vol. 2 Issue 3, p136 

    This paper attempts to introduce a method for developing secure software based on the vulnerabilities which are already known. The basic idea of this paper can be justified by referring to CERT/CC statistics according to which, more than 90% of vulnerabilities leak out during system design and...

  • Adult books: Cookery. Jacobs, Barbara // Booklist;3/15/96, Vol. 92 Issue 14, p1232 

    Reviews the book `Grill Italian,' by Clifford A. Wright.

  • Reed warbler.  // Encyclopedia of Animals;8/1/2017, p1 

    The reed warbler is a small, shy bird. It is known for its intricate, or fancy, nest. Although it is a small and vulnerable bird, it has an average life span of 12 years.

  • Linux Flaw Fix Urged.  // Micro Mart;11/2/2016 Special Issue, Issue 1438, p57 

    The article reports on the discovery of a Linux kernel security vulnerability known as the "Dirty COW" was detected in the operating system's Linux servers and urged companies and the public to patch servers.

Share

Read the Article

Courtesy of

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics