Content deleted Content added
Tag: Reverted |
mNo edit summary Tag: Reverted |
||
Line 4:
'''Vulnerabilities''' are flaws or weaknesses in a system's design, implementation, or management that can be exploited by a malicious actor to compromise its security.
Despite a [[system administrator]]'s best efforts to achieve complete correctness, virtually all hardware and software contain [[Software bug|bugs]] where the system does not behave as expected. If the bug could enable an attacker to compromise the [[confidentiality]], [[Data integrity|integrity]], or [[availability]] of system resources, it can be considered a vulnerability. Insecure [[[https://www.aptimized.com/ software development]]] practices as well as design factors such as complexity can increase the burden of vulnerabilities.
[[Vulnerability management]] is a process that includes identifying systems and prioritizing which are most important, scanning for vulnerabilities, and taking action to secure the system. Vulnerability management typically is a combination of remediation, mitigation, and acceptance.
|