𝔖 Bobbio Scriptorium
✦   LIBER   ✦

The Laws of Vulnerabilities: Which security vulnerabilities really matter?

✍ Scribed by Gerhard Eschelbeck


Publisher
Elsevier Science
Year
2005
Tongue
English
Weight
188 KB
Volume
10
Category
Article
ISSN
1363-4127

No coin nor oath required. For personal study only.

✦ Synopsis


New security vulnerabilities are discovered on a daily basis. With each new announcement, the same questions arise. How significant is this vulnerability? How prevalent? How easy is it to exploit? Due to a lack of global vulnerability data, answers are hard to find and risk rating is even more difficult. The Laws of Vulnerabilities are the conclusions of analyzing statistical vulnerability information over a three-year period. Those vulnerabilities have been identified in the real world across hundreds of thousands of systems and networks. These data are not identifiable to individual users or systems. However, it provides significant statistical data for research and analysis, which enabled us to define and publish the Laws of Vulnerabilities (


πŸ“œ SIMILAR VOLUMES


The availability of source code in relat
✍ John Reinke; Hossein Saiedian πŸ“‚ Article πŸ“… 2003 πŸ› Elsevier Science 🌐 English βš– 199 KB

Once a vulnerability has been found in an application or service that runs on a computer connected to the Internet, fixing that exploit in a timely fashion is of the utmost importance. There are two parts to fixing vulnerability: a party acting on behalf of the application's vendor gives instruction

An early application of the Bell Labs Se
✍ Vijay K. Gurbani; Andrew R. McGee πŸ“‚ Article πŸ“… 2007 πŸ› Institute of Electrical and Electronics Engineers 🌐 English βš– 173 KB

The Bell Labs Security Framework provides a comprehensive matrix that can be used to evaluate the security of an application (service), host, protocol, or communication link. The methodology has been used to assess the security of information technology (IT) and telecommunications services, as well