Vulnerability (computer security): Difference between revisions

Content deleted Content added
Tag: Reverted
mNo edit summary
Tag: Reverted
Line 4:
'''Vulnerabilities''' are flaws or weaknesses in a system's design, implementation, or management that can be exploited by a malicious actor to compromise its security.
 
Despite a [[system administrator]]'s best efforts to achieve complete correctness, virtually all hardware and software contain [[Software bug|bugs]] where the system does not behave as expected. If the bug could enable an attacker to compromise the [[confidentiality]], [[Data integrity|integrity]], or [[availability]] of system resources, it can be considered a vulnerability. Insecure [[[https://www.aptimized.com/ software development]]] practices as well as design factors such as complexity can increase the burden of vulnerabilities.
 
[[Vulnerability management]] is a process that includes identifying systems and prioritizing which are most important, scanning for vulnerabilities, and taking action to secure the system. Vulnerability management typically is a combination of remediation, mitigation, and acceptance.