Vulnerabilities
Is a weakness in a system (software, hardware…). It’s a broad concept as a vulnerability can derive from many things.
A vulnerability allows an attacker to violate a reasonable security policy for that system.
Policies define how a system should behave.
Examples:
Wheels will turn left only when steering wheel turns left.
Phones will only allow access to its owner.
Programs will only run code inserted by its original developer.
Vulnerability number always increases as software grows.
It’s inherent to the increased complexity, interactions, development process.
Also, they do not disappear.
Software is updated with fixes, but older software is still vulnerable.
Vulnerabilities are states in a computing system that either allows an attacker to:
execute commands as another user.
access data that is contrary to the specified access restrictions for that data.
pose as another entity.
conduct a denial of service (DoS) (affect availability).
Last updated