首页| JavaScript| HTML/CSS| Matlab| PHP| Python| Java| C/C++/VC++| C#| ASP| 其他|
购买积分 购买会员 激活码充值

您现在的位置是:虫虫源码 > 其他 > trecc

trecc

  • 资源大小:35.12 kB
  • 上传时间:2021-06-30
  • 下载次数:0次
  • 浏览次数:0次
  • 资源积分:1积分
  • 标      签:

资 源 简 介

ABSTRACT Computer systems are subject to a vulnerability lifecycle: product release, vulnerability discovery, exploitation window, patch/mitigation release, vulnerability discovery, ad infinitum. Since human error and the introduction of vulnerabilities can never be fully eliminated, vendors have accepted the reality that their software will always be susceptible to attacks that take advantage of unknown vulnerabilities. The exploitation of a vulnerability whose details are unknown to the vendor is called an 0day (“oh-day” or “zero-day”) attack, in reference to the “zeroth” day of vendor awareness. Likewise, organizations with particular concern for the security of their information must assume that the software they employ is vulnerable to an attack they cannot hope to patch: the unknown, 0day threat. Instead, such entities rely on strategies that make it provably difficult or impossible to exploit an attack vector or a class of vulnerability. One such

文 件 列 表

trecc_src
etc
init.d
sbin
etc
VIP VIP
0.198480s