Software Training Videos In Telugu
Software Training Videos In Telugu
Blog Archive
-
2011
(42)
- October(15)
-
September(27)
- Find Specific Types of Systems
- Mirror Website
- Command-Line Whois Searches
- Query Whois Databases
- Network Reconnaissance & DNS Search
- TerraServer is a commercial website[1] specializin...
- Find Information by the Target (Edgar)
- Typical Vulnerability Life Cycle
- Ec-Council Certified Security Analyst and Licensed...
- Career Academy Hacking, Penetration Testing and Co...
- Footprinting/Reconnaissance
- skill set
- Network Layer of the OSI Model
- Data Link Layer of the OSI Model
- Physical Layer of the OSI Model
- layers of osi
- The OSI Model
- Reading terms
- TCP Header format
- google terms
- google search terms
- Information Security / IT Audit - Executive / Sr E...
- Application Security Specialist - C++/Java for Top...
- Consultant & Assoc. Consultant VAPT
- Security Testing, Audit
- Information Security Analyst
- Common Responsibilities for Information Security J...
Thursday, 29 September 2011
Typical Vulnerability Life Cycle
http://www.iss.net/documents/whitepapers/ISS_Vulnerability_Lifecycle_Whitepaper.pdf
This life-cycle has the following stages:
http://singe.za.net/blog/archives/928-Vulnerability-Life-Cycle.html
This life-cycle has the following stages:
- The creation of the vulnerability. This is when the vulnerability is created during the implementation of the vulnerable product.
- The discovery of a vulnerability. The vulnerability in the product is found. Several people could discover the vulnerability at different times. Little is ever publicly known about this step.
http://singe.za.net/blog/archives/928-Vulnerability-Life-Cycle.html
Subscribe to:
Post Comments (Atom)
0 comments:
Post a Comment