Search for "Vulnerability" in article titles:

  1. Vulnerability index: A vulnerability index is a measure of the exposure of a population to some hazard. Typically, the index is a composite of multiple quantitative indicators that via some formula, delivers a single numerical result. [100%] 2023-05-12 [Vulnerability] [Environmental economics]...
  2. Vulnerability assessment: Vulnerability assessment is the process of identifying, quantifying and prioritising (or classifying) the vulnerabilities of a system. The following are some examples of systems where vulnerability assessment is applied: nuclear power plants, computer systems, energy supply systems, water systems, transport ... [100%] 2023-12-19 [Climate change] [Risk management]...
  3. Vulnerability assessment: A vulnerability assessment is the process of identifying, quantifying, and prioritizing (or ranking) the vulnerabilities in a system. Examples of systems for which vulnerability assessments are performed include, but are not limited to, information technology systems, energy supply systems, water ... [100%] 2023-07-23 [Risk management]
  4. Vulnerability database: A vulnerability database (VDB) is a platform aimed at collecting, maintaining, and disseminating information about discovered computer security vulnerabilities. The database will customarily describe the identified vulnerability, assess the potential impact on affected systems, and any workarounds or updates to ... (Computer security vulnerabilities) [100%] 2024-01-04 [Computer security exploits] [Types of databases]...
  5. Vulnerability database: A vulnerability database (VDB) is a platform aimed at collecting, maintaining, and disseminating information about discovered computer security vulnerabilities. The database will customarily describe the identified vulnerability, assess the potential impact on affected systems, and any workarounds or updates to ... (Computer security vulnerabilities) [100%] 2024-04-19 [Computer security exploits] [Types of databases]...
  6. Vulnerability management: Vulnerability management is the "cyclical practice of identifying, classifying, prioritizing, remediating, and mitigating" software vulnerabilities. Vulnerability management is integral to computer security and network security, and must not be confused with vulnerability assessment. [100%] 2024-05-10 [Computer security procedures] [Security compliance]...
  7. Homeless Vulnerability Index: The Vulnerability Index is a survey and analysis methodology for "identifying and prioritizing the street homeless population for housing according to the fragility of their health". It is a pragmatic methodology based on concern and inquiry into the reasons for ... (Public health methodology) [81%] 2024-02-04 [Homelessness] [Humanitarian aid]...
  8. Environmental Vulnerability Index: The Environmental Vulnerability Index (EVI) is a measurement devised by the South Pacific Applied Geoscience Commission (SOPAC), the United Nations Environment Program and others to characterize the relative severity of various types of environmental issues suffered by 243 enumerated individual ... (Earth) [81%] 2023-07-19 [Environmental science]
  9. Vulnerability Assessment Laboratory: The Vulnerability Assessment Laboratory (VAL) was a research institution under the U.S. Army Materiel Command (AMC) that specialized in missile electronic warfare, vulnerability, and surveillance. [81%] 2023-03-17 [Military technology] [Research installations of the United States Army]...
  10. Vulnerability Discovery Model: A Vulnerability Discovery Model (VDM) uses discovery event data with software reliability models for predicting the same. A thorough presentation of VDM techniques is available in. [81%] 2022-11-27 [Computer security] [System software]...
  11. Environmental Vulnerability Index: The Environmental Vulnerability Index (EVI) is a measurement devised by the South Pacific Applied Geoscience Commission (SOPAC), the United Nations Environment Program and others to characterize the relative severity of various types of environmental issues suffered by 243 enumerated individual ... [81%] 2022-07-08 [Environmental science] [Environmental indices]...
  12. Economic Vulnerability Index: The Economic vulnerability index is one of the criteria used by the United Nations Committee for Development Policy, an advisory body to the United Nations Economic and Social Council, in the identification of Least Developed Countries. It is a composite ... [81%] 2023-07-25 [Global economic indicators]
  13. Climate Vulnerability Index: The Climate Vulnerability Index (CVI), also referred to as Climate Change Vulnerability Index (CCVI), is a tool that identifies places that are susceptible to floods and heat-related effects of climate change by combining built, social, and ecological elements. It ... [81%] 2023-11-14 [Effects of climate change] [Indexes]...
  14. Vulnerability Discovery Model: A Vulnerability Discovery Model (VDM) uses discovery event data with software reliability models for predicting the same. A thorough presentation of VDM techniques is available in. [81%] 2023-12-14 [Computer security] [System software]...
  15. Climate Vulnerability Index: The Climate Vulnerability Index (CVI), also referred to as Climate Change Vulnerability Index (CCVI), is a tool that identifies places that are susceptible to floods and heat-related effects of climate change by combining built, social, and ecological elements. It ... (Earth) [81%] 2024-03-23 [Climate] [Climate change]...
  16. Vulnerability assessment (computing): Vulnerability assessment is a process of defining, identifying and classifying the security holes in information technology systems. An attacker can exploit a vulnerability to violate the security of a system. (Computing) [81%] 2024-11-28 [Information technology] [Computer security]...
  17. Vulnerability (computer security): Vulnerabilities are flaws in a computer system that weaken the overall security of the system. Despite intentions to achieve complete correctness, virtually all hardware and software contains bugs where the system does not behave as expected. (Computer security) [81%] 2025-04-03 [Vulnerability] [Hacking (computer security)]...
  18. Open Source Vulnerability Database: Open Sourced Vulnerability Database (OSVDB) was an independent and open-sourced database. The goal of the project was to provide accurate, detailed, current, and unbiased technical information on security vulnerabilities. [70%] 2023-12-10 [Computer security exploits]
  19. Sourcefire Vulnerability Research Team: The Sourcefire Vulnerability Research Team (VRT) was a group of network security engineers which discovered and assessed trends in hacking activities, intrusion attempts, and vulnerabilities. Members of the Sourcefire VRT include the ClamAV team as well as authors of several ... (Organization) [70%] 2023-12-20 [Computer security organizations]
  20. Vulnerability of cardiac dynamics: Vulnerability is an asymmetric response of an excitable medium to a stimulus, when the stimulus successfully initiates propagation some directions and fails in other directions. The asymmetric response, a discontinuous wave, is the result of propagation into regions of spatially ... [70%] 2021-12-24 [Cardiac Dynamics] [Dynamical Systems]...
  21. Common Vulnerability Scoring System: The Common Vulnerability Scoring System (CVSS) is a free and open industry standard for assessing the severity of computer system security vulnerabilities. CVSS attempts to assign severity scores to vulnerabilities, allowing responders to prioritize responses and resources according to threat. (Standard for assessing computer system vulnerabilities) [70%] 2024-11-30 [Computer security standards] [Computer network security]...
  22. Open Vulnerability and Assessment Language: Open Vulnerability and Assessment Language (OVAL) is an international, information security, community standard to promote open and publicly available security content, and to standardize the transfer of this information across the entire spectrum of security tools and services. OVAL includes ... (International information security community standard) [63%] 2022-06-14 [Computer security procedures] [Mitre Corporation]...
  23. Vulnerability of nuclear plants to attack: The vulnerability of nuclear plants to deliberate attack is of concern in the area of nuclear safety and security. Nuclear power plants, civilian research reactors, certain naval fuel facilities, uranium enrichment plants, fuel fabrication plants, and even potentially uranium mines ... (none) [57%] 2022-09-06 [Nuclear safety and security]
  24. Addiction vulnerability: Addiction vulnerability is an individual's risk of developing an addiction during their lifetime. There are a range of genetic and environmental risk factors for developing an addiction that vary across the population. (Medicine) [100%] 2023-12-10 [Addiction psychiatry]
  25. Social vulnerability: In its broadest sense, social vulnerability is one dimension of vulnerability to multiple stressors and shocks, including abuse, social exclusion and natural hazards. Social vulnerability refers to the inability of people, organizations, and societies to withstand adverse impacts from multiple ... [100%] 2023-03-12 [Vulnerability] [Sociological terminology]...
  26. Reptar (vulnerability): Reptar is a CPU vulnerability discovered in late 2023, affecting recent Intel x86 CPUs. It relates to processing of x86 instruction prefixes in a way that leads to unexpected behavior. (Vulnerability) [100%] 2023-12-14 [Computer security exploits]
  27. ROCA vulnerability: The ROCA vulnerability is a cryptographic weakness that allows the private key of a key pair to be recovered from the public key in keys generated by devices with the vulnerability. "ROCA" is an acronym for "Return of Coppersmith's ... (Cryptographic valunerability) [100%] 2023-01-31 [Cryptographic attacks]
  28. Social vulnerability: In its broadest sense, social vulnerability is one dimension of vulnerability to multiple stressors and shocks, including abuse, social exclusion and natural hazards. Social vulnerability refers to the inability of people, organizations, and societies to withstand adverse impacts from multiple ... (Social) [100%] 2022-06-28 [Sociological terminology]
  29. Systemic vulnerability: Systemic vulnerability is a concept in political economy of development which refers to conditions that tend to make a state more effective in promoting development. These conditions have been described as "broad coalitions", "resource constraints", and "external threat". (Finance) [100%] 2023-01-05 [Political economy]
  30. Reptar (vulnerability): The Benton Visual Retention Test (or simply Benton test or BVRT) is an individually administered test for people aged from eight years to adulthood that measures visual perception and visual memory. It can also be used to help identify possible ... (Vulnerability) [100%] 2024-03-04 [Computer security exploits]
  31. Systemic vulnerability: Systemic vulnerability is a concept in political economy of development which refers to conditions that tend to make a state more effective in promoting development. These conditions have been described as "broad coalitions", "resource constraints", and "external threat". [100%] 2024-05-23 [Political economy]
  32. Spectre (cybersecurity vulnerability): Spectre is a pair of hardware vulnerabilities in some Microprocessors which abuses "speculative execution." It is a set of variants to the Meltdown vulnerability. The first is "bounds check bypass" (CVE-2017-5753), the second and more serious is "branch ... (Cybersecurity vulnerability) [81%] 2023-02-17 [Cybersecurity Vulnerabilities]
  33. Spectre (security vulnerability): Spectre refers to one of the two original transient execution CPU vulnerabilities (the other being Meltdown), which involve microarchitectural timing side-channel attacks. These affect modern microprocessors that perform branch prediction and other forms of speculation. (Security vulnerability) [81%] 2023-12-27 [X86 architecture] [X86 memory management]...
  34. Spoiler (security vulnerability): Spoiler is a security vulnerability on modern computer central processing units that use speculative execution. It exploits side-effects of speculative execution to improve the efficiency of Rowhammer and other related memory and cache attacks. (Security vulnerability) [81%] 2022-11-28 [Computer security exploits]
  35. ZmEu (vulnerability scanner): ZmEu is a computer vulnerability scanner which searches for web servers that are open to attack through the phpMyAdmin program, It also attempts to guess SSH passwords through brute-force methods, and leaves a persistent backdoor. It was developed in ... (Software) [81%] 2023-07-25 [Computer security software]
  36. BlueBorne (security vulnerability): BlueBorne is a type of security vulnerability with Bluetooth implementations in Android, iOS, Linux and Windows. It affects many electronic devices such as laptops, smart cars, smartphones and wearable gadgets. (Security vulnerability) [81%] 2023-10-17 [Computer security] [2017 in computing]...
  37. Mass assignment vulnerability: Mass assignment is a computer vulnerability where an active record pattern in a web application is abused to modify data items that the user should not normally be allowed to access such as password, granted permissions, or administrator status. Many ... [81%] 2023-08-27 [Web security exploits]
  38. Meltdown (cybersecurity vulnerability): Meltdown is the name given to a cybersecurity vulnerability in the processors of computers, tablets, phones, and other such electronic devices. It enables code to be executed on a machine which "breaks" certain "isolation walls" in the processor, enabling user ... (Cybersecurity vulnerability) [81%] 2023-02-14 [Cybersecurity Vulnerabilities]
  39. Default Credential vulnerability: A Default Credential vulnerability is a type of vulnerability in a computing device that most commonly affects devices having some pre-set (default) administrative credentials to access all configuration settings. The vendor or manufacturer of such devices uses a single ... [81%] 2024-01-08 [Web security exploits]
  40. Follina (security vulnerability): Follina is the name given to a remote code execution (RCE) vulnerability, a type of arbitrary code execution (ACE) exploit, in the Microsoft Support Diagnostic Tool (MSDT) which was first widely publicized on May 27, 2022, by a security research ... (Security vulnerability) [81%] 2023-02-25 [Injection exploits] [Computer security]...
  41. VENOM (security vulnerability): VENOM (Virtualized Environment Neglected Operations Manipulation) is a computer security flaw that was publicly disclosed in 2015 by Jason Geffner of CrowdStrike. The flaw was introduced in 2004 and affected versions of QEMU, Xen, KVM, and VirtualBox from that date ... (Security vulnerability) [81%] 2023-02-25 [Computer security exploits]

external From search of external encyclopedias:

0