Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
Vulnerability (computer security)
(section)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
==Sources== {{refbegin|indent=yes}} *{{cite book |last1=Ablon |first1=Lillian |last2=Bogart |first2=Andy |title=Zero Days, Thousands of Nights: The Life and Times of Zero-Day Vulnerabilities and Their Exploits |date=2017 |publisher=Rand Corporation |isbn=978-0-8330-9761-3 |language=en|url=https://www.rand.org/content/dam/rand/pubs/research_reports/RR1700/RR1751/RAND_RR1751.pdf}} *{{cite journal | last1=Agrafiotis | first1=Ioannis | last2=Nurse | first2=Jason R C | last3=Goldsmith | first3=Michael | last4=Creese | first4=Sadie | last5=Upton | first5=David | title=A taxonomy of cyber-harms: Defining the impacts of cyber-attacks and understanding how they propagate | journal=Journal of Cybersecurity | volume=4 | issue=1 | date=2018 | issn=2057-2085 | doi=10.1093/cybsec/tyy006|ref={{sfnref|Agrafiotis et al.|2018}}}} *{{cite book |last1=Daswani |first1=Neil|authorlink=Neil Daswani |last2=Elbayadi |first2=Moudy |title=Big Breaches: Cybersecurity Lessons for Everyone |date=2021 |publisher=Apress |isbn=978-1-4842-6654-0}} *{{cite book |last1=Garg |first1=Shivi |last2=Baliyan |first2=Niyati |title=Mobile OS Vulnerabilities: Quantitative and Qualitative Analysis |date=2023 |publisher=CRC Press |isbn=978-1-000-92451-0 |language=en}} *{{cite book |last1=Haber |first1=Morey J. |last2=Hibbert |first2=Brad |title=Asset Attack Vectors: Building Effective Vulnerability Management Strategies to Protect Organizations |date=2018 |publisher=Apress |isbn=978-1-4842-3627-7 |language=en}} *{{cite book |last1=Libicki |first1=Martin C. |last2=Ablon |first2=Lillian |last3=Webb |first3=Tim|url=https://www.rand.org/content/dam/rand/pubs/research_reports/RR1000/RR1024/RAND_RR1024.pdf |title=The Defender's Dilemma: Charting a Course Toward Cybersecurity |date=2015 |publisher=Rand Corporation |isbn=978-0-8330-8911-3 |language=en}} *{{cite book |last1=Linkov |first1=Igor |last2=Kott |first2=Alexander |title=Cyber Resilience of Systems and Networks |date=2019 |publisher=Springer International Publishing |isbn=978-3-319-77492-3 |pages=1β25 |language=en |chapter=Fundamental Concepts of Cyber Resilience: Introduction and Overview}} *{{cite book |last1=Magnusson |first1=Andrew |title=Practical Vulnerability Management: A Strategic Approach to Managing Cyber Risk |date=2020 |publisher=No Starch Press |isbn=978-1-59327-989-9 |language=en}} *{{cite book |last1=O'Harrow |first1=Robert |title=Zero Day: The Threat In Cyberspace |date=2013 |publisher=Diversion Books |isbn=978-1-938120-76-3 |language=en}} *{{cite book |last1=Perlroth |first1=Nicole |title=This Is How They Tell Me the World Ends: Winner of the FT & McKinsey Business Book of the Year Award 2021 |date=2021 |publisher=Bloomsbury Publishing |isbn=978-1-5266-2983-8 |language=en}} *{{cite book |last1=Salmani |first1=Hassan |title=Trusted Digital Circuits: Hardware Trojan Vulnerabilities, Prevention and Detection |date=2018 |publisher=Springer |isbn=978-3-319-79081-7 |language=en}} *{{cite book |last1=Seaman |first1=Jim |title=PCI DSS: An Integrated Data Security Standard Guide |date=2020 |publisher=Apress |isbn=978-1-4842-5808-8 |language=en}} *{{Cite book |last=Sharp |first=Robin |url= |title=Introduction to Cybersecurity: A Multidisciplinary Challenge |date=2024 |publisher=Springer Nature |isbn=978-3-031-41463-3 |language=en}} *{{cite book |last1=Sloan |first1=Robert H. |last2=Warner |first2=Richard |title=Why Don't We Defend Better?: Data Breaches, Risk Management, and Public Policy |date=2019 |publisher=CRC Press |isbn=978-1-351-12729-5 |language=en}} *{{cite book |last1=Sood |first1=Aditya |last2=Enbody |first2=Richard |title=Targeted Cyber Attacks: Multi-staged Attacks Driven by Exploits and Malware |date=2014 |publisher=Syngress |isbn=978-0-12-800619-1 |language=en}} *{{cite book |last1=Strout |first1=Benjamin |title=The Vulnerability Researcher's Handbook: A comprehensive guide to discovering, reporting, and publishing security vulnerabilities |date=2023 |publisher=Packt Publishing |isbn=978-1-80324-356-6 |language=en}} *{{cite book |last1=Tjoa |first1=Simon |last2=GafiΔ |first2=Melisa |last3=Kieseberg |first3=Peter |title=Cyber Resilience Fundamentals |date=2024 |publisher=Springer Nature |isbn=978-3-031-52064-8 |language=en|ref={{sfnref|Tjoa et al.|2024}}}} {{refend}}
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)