Vulnerability (computer security): Difference between revisions

Content deleted Content added
Causes: paragraph copyedit
Design factors: section copy edit, yes i know i added cns ill fix them later
Line 16:
 
===Design factors===
Vulnerabilities can be worsened by poor design factors, such as:
Fundamental design factors that can increase the burden of vulnerabilities include:
*Complexity: Large, complex systems increase the probabilitypossibility of flaws and unintended [[File system permissions|access point]]spoints.<ref name=Vacca23>{{cite book|last= Kakareka|first=Almantas|editor-last=Vacca|editor-first=John|title=Computer and Information Security Handbook|series=Morgan Kaufmann Publications|year=2009|publisher= Elsevier Inc|isbn= 978-0-12-374354-1|page=393|chapter=23}}</ref>
*Familiarity: Using common, well-known code, software, operating systems, and/or hardware increases the probability an attacker has or can find the knowledge and tools to exploit the flaw.<ref>{{cite book | title = Technical Report CSD-TR-97-026 | first = Ivan | last = Krsul | publisher = The COAST Laboratory Department of Computer Sciences, Purdue University | date = April 15, 1997 | citeseerx = 10.1.1.26.5435 }}</ref> However, using well-known software, particularly [[free and open-source software]], comes with the benefit of having more frequent and reliable software patches for any discovered vulnerabilities.{{cn}}
|last= Kakareka
*Connectivity: any system connected to the internet can be accessed and compromised. [[Air gap (networking)|Disconnecting systems from the internet]] iscan onebe trulyextremely effective measureat againstpreventing attacks, but it is rarelynot always feasible.{{sfn|Linkov|Kott|2019|p=2}}
|first=Almantas
*[[Legacy software]] and [[legacy hardware|hardware]] is at increased risk, butby nature.{{sfn|Haber |Hibbert|2018|p=155}} System administrators should consider upgrading oftenfrom legacy systems, but this is often prohibitive in terms of cost and [[downtime]].{{sfn|Haber |Hibbert|2018|p=155cn}}
|editor-last=Vacca
|editor-first=John
|title=Computer and Information Security Handbook
|series=Morgan Kaufmann Publications
|year=2009
|publisher= Elsevier Inc
|isbn= 978-0-12-374354-1
|page=393
|chapter=23
}}
</ref>
*Familiarity: Using common, well-known code, software, operating systems, and/or hardware increases the probability an attacker has or can find the knowledge and tools to exploit the flaw.<ref>{{cite book | title = Technical Report CSD-TR-97-026 | first = Ivan | last = Krsul | publisher = The COAST Laboratory Department of Computer Sciences, Purdue University | date = April 15, 1997 | citeseerx = 10.1.1.26.5435 }}</ref>
*Connectivity: any system connected to the internet can be accessed and compromised. [[Air gap (networking)|Disconnecting systems from the internet]] is one truly effective measure against attacks, but it is rarely feasible.{{sfn|Linkov|Kott|2019|p=2}}
*[[Legacy software]] and [[legacy hardware|hardware]] is at increased risk, but upgrading often is prohibitive in terms of cost and [[downtime]].{{sfn|Haber |Hibbert|2018|p=155}}
 
===Development factors===