Movatterモバイル変換


[0]ホーム

URL:


Jump to content
WikipediaThe Free Encyclopedia
Search

Talk:Vulnerability (computer security)

Page contents not supported in other languages.
From Wikipedia, the free encyclopedia
Security bug was nominated fordeletion.The discussion was closed on3 July 2025 with a consensus tomerge. Its contents weremerged intoVulnerability (computer security). The original page is now a redirect to this page. For the contribution history and old versions of the redirected article, please seeits history; for its talk page, seehere.
This is thetalk page for discussing improvements to theVulnerability (computer security) article.
This isnot a forum for general discussion of the subject of the article.
Find sources: Google (books ·news ·scholar ·free images ·WP refs·FENS ·JSTOR ·TWL
This article is ratedB-class on Wikipedia'scontent assessment scale.
It is of interest to the followingWikiProjects:
WikiProject iconComputing:Software /SecurityMid‑importance
WikiProject iconThis article is within the scope ofWikiProject Computing, a collaborative effort to improve the coverage ofcomputers,computing, andinformation technology on Wikipedia. If you would like to participate, please visit the project page, where you can jointhe discussion and see a list of open tasks.ComputingWikipedia:WikiProject ComputingTemplate:WikiProject ComputingComputing
MidThis article has been rated asMid-importance on theproject's importance scale.
Taskforce icon
This article is supported byWikiProject Software (assessed asHigh-importance).
Taskforce icon
This article is supported byWikiProject Computer security (assessed asTop-importance).
Things you can helpWikiProject Computer security with:
  • Review importance and quality of existing articles
  • Identify categories related to Computer Security
  • Tag related articles
  • Identify articles for creation (see also:Article requests)
  • Identify articles for improvement
  • Create the Project Navigation Box including lists of adopted articles, requested articles, reviewed articles, etc.
  • Find editors who have shown interest in this subject and ask them to take a look here.
Tip: Anchors arecase-sensitive in most browsers.

This article containsbroken links to one or more targetanchors:

  • [[Malware#Security defect|security defect]] The anchor (#Security defect) is no longer available because it wasdeleted by a user before.

The anchors may have been removed, renamed, or are no longer valid. Please fix them by following the link above, checking thepage history of the target pages, or updating the links.

Remove this template after the problem is fixed |Report an error

What is a vulnerability

[edit]

I think this is a good idea -- the Software security vulnerability article can be used as part of the Vulnerability article.


I am curious, doesn't vulnerability need to say that its "vulnerable to" something? for example, we don't say that "New Orleans is vulnerable." We might say that "New Orleans has a high vulnerability to a Force 5 hurricane" but could we just say that the "New Orleans Levees have high vulnerabilities to hurricanes" I don't think so since they really were only vulnerable to level 5 and higher. There needs to be a force against. Or a Threat... in fact more specifically, there needs to be a specific amount of threat. Like FORCE 5 hurricanes. In computing, vendors have erroneously stated that a server has a high vulnerability... but often without regard to what amount threat. My server has almost no vulnerabilities if my threat agent is a four-year-old girl. But a skilled, malicious hacker sponsored by a terrorist state might make Swiss cheese of my server. Did my vulnerability just change based on the threat agent's capabilities? I think it did. Maybe we should consider adding something that states that vendors of security products typically over-generalize the acting threat agents... or do they even consider them? -- Anonymous

There are computer vulnerabilities, network vulnerabilities, application vulnerabilities ... each layer of the network stack is subject to attacks based on the properties of that layer. Like saying New Orleans is vulnerable to weather, famine, disease ...Tanjstaffl(talk)00:26, 19 April 2007 (UTC)[reply]

The first paragraph has at least, two problems that persist.
The definition of "Vulnerability" is incorrect. What is offered as such, accurately identifies the requirements for breach.
"Information Assurance" should be replaced with "trust" -- as in, a person's emotional feeling of trust. "Information Assurance" is specific I think, to DOD/military while "InfoSec" is used in a civilian/non-mil context. Each is a topic, much like "History" or "Social Studies". The objective for each, differs. In a mil context, the objective is mission security whereas in the civilian context, the focus is on loss of life. Life isn't valued differently but statistics used to assess risk treat loss of life as Integer data rather than as Binary Categorical data.

Kernel.package (talk)21:30, 27 December 2010 (UTC)[reply]

Vulnerability to poverty is a measure which describes the greater probability to certain communities or individuals of becoming poor or remaining poor in the coming yearsEdwin saji 83 (talk)23:49, 5 December 2018 (UTC)[reply]

Vulnerability is determined by the options available to different communities for finding an alternative living in terms of assets, education, health and job opportunitiesEdwin saji 83 (talk)23:57, 5 December 2018 (UTC)[reply]

Disclosure

[edit]

I think the section on full disclosure starts out good, showing a balanced view of the topic, but then takes a biased point of view, I myself am generally considered an expert in the security arena that the public listens to and I don't fully agree with full disclosure, its a complicated issue, it should be discussed by all means but the sentence that reads "From the security perspective, only a free and public disclosure can ensure that all interested parties get the relevant information. Security through obscurity is a concept that most experts consider unreliable." onward takes a biased view point on the issue, there are pros and cons to both sides and wikipedia shouldnt be taking sides on this or any contravercial issue --Michael Lynn23:39, 20 March 2007 (UTC)[reply]

I agree. Disclosure methods are controversial, prone to bias viewpoints and will proably stay that way for the foreseeable future. I moved that section from its original place in the article (where it didnt belong at all imo) and made a minor change to reduce some of the bias but I think it needs to be completely reworked. What might work is to have a para on different methods of disclosure (i.e. full disclosure, "responsible disclosure", "pre disclosure etc)"). Even then that can be tricky to write without bias (ex: what is "responsible disclosure").Dman72703:05, 21 March 2007 (UTC)[reply]

advertising

[edit]

it bugs me to see so many links to commercial products here, its not representative of the whole market and even if it was, this is not an advertising venue, its an encyclopedia, can we clean up that garbage? --Michael Lynn22:14, 13 April 2007 (UTC)[reply]

The first paragraph

[edit]

The first paragraph seems to have been plagiarized fromhttp://www.techcert.lk/index.php?option=com_content&task=view&id=5&Itemid=33 so I have removed it. --Waldo (talk)

A construct in a computer language is said to be a vulnerability when many program faults can have their root cause traced to its use.

[edit]

I removed this; it was reverted. Fair enough. But I hope that a good reference will be added soon, or I'll remove it again.

Memory allocation bugs are a big source of vulnerabilities. But who calls memory allocation a vulnerability? Likewise, people screw up all the time with pointers. But I've never heard the pointers themselves called "a vulnerability." A potentialsource of vulnerabilities, sure.

Now, it's entirely possible that during my existence I've just completely missed this use of terminology. If it is in fact used in practice, please add a reliable reference. Thanks,WalterGR (talk |contributions)01:18, 18 March 2008 (UTC)[reply]

Good point. Perhaps the appropriate term to use issource of vulnerabilities, orcommon source of vulnerabilities. One reference isthis work.Derek farn (talk)02:11, 18 March 2008 (UTC)[reply]

Tags

[edit]

This article has been tagged for a long time. Are there still active disputes? If so, let's address them. If not, or no one cares, let's delete any problematic sections of the article, and remove the tags. --Elonka04:39, 3 August 2008 (UTC)[reply]

Vulnerability windows and definitions

[edit]

See my comments onTalk:Zero-day attack --AlastairIrvine (talk)17:58, 10 April 2014 (UTC)[reply]

Examples

[edit]

Peripheral devices vulnerabilities are well known threat for number of years , articles published by number of Universities , Forbes , Checkmarx , Mashable , Android Authority and dozens of other sites.

External links modified

[edit]

Hello fellow Wikipedians,

I have just added archive links to 2 external links onVulnerability (computing). Please take a moment to reviewmy edit. If necessary, add{{cbignore}} after the link to keep me from modifying it. Alternatively, you can add{{nobots|deny=InternetArchiveBot}} to keep me off the page altogether. I made the following changes:

When you have finished reviewing my changes, please set thechecked parameter below totrue to let others know.

This message was posted before February 2018.After February 2018, "External links modified" talk page sections are no longer generated or monitored byInternetArchiveBot. No special action is required regarding these talk page notices, other thanregular verification using the archive tool instructions below. Editorshave permission to delete these "External links modified" talk page sections if they want to de-clutter talk pages, but see theRfC before doing mass systematic removals. This message is updated dynamically through the template{{source check}}(last update: 5 June 2024).

  • If you have discovered URLs which were erroneously considered dead by the bot, you can report them withthis tool.
  • If you found an error with any archives or the URLs themselves, you can fix them withthis tool.

Cheers.—cyberbot IITalk to my owner:Online09:35, 9 January 2016 (UTC)[reply]

External links modified

[edit]

Hello fellow Wikipedians,

I have just modified one external link onVulnerability (computing). Please take a moment to reviewmy edit. If you have any questions, or need the bot to ignore the links, or the page altogether, please visitthis simple FaQ for additional information. I made the following changes:

When you have finished reviewing my changes, you may follow the instructions on the template below to fix any issues with the URLs.

This message was posted before February 2018.After February 2018, "External links modified" talk page sections are no longer generated or monitored byInternetArchiveBot. No special action is required regarding these talk page notices, other thanregular verification using the archive tool instructions below. Editorshave permission to delete these "External links modified" talk page sections if they want to de-clutter talk pages, but see theRfC before doing mass systematic removals. This message is updated dynamically through the template{{source check}}(last update: 5 June 2024).

  • If you have discovered URLs which were erroneously considered dead by the bot, you can report them withthis tool.
  • If you found an error with any archives or the URLs themselves, you can fix them withthis tool.

Cheers.—InternetArchiveBot(Report bug)16:19, 24 December 2017 (UTC)[reply]

Error in definition

[edit]

The sentence "Vulnerabilities are the intersection of three elements: a system susceptibility or flaw, attacker access to the flaw, and attacker capability to exploit the flaw" was simply wrong. Removed. All definitions provided in this article are correct, while the sentence is correct for a (security) breach, not for a vulnerability. There is already the same comment here in the talk page.Truman (talk)13:54, 10 May 2018 (UTC)[reply]

Edit request

[edit]
Thisedit request by an editor with a conflict of interest has now been answered.

Please replace the content of the article withUser:Buidhe paid/Vulnerability (computing). Reason: Improve content + sourcing, add new sections on such topics as vulnerability management, lifecycle, assessment, and legal issues. Thanks!Buidhe paid (talk)23:56, 3 May 2024 (UTC)[reply]

 Done v/r -Seawolf35T--C13:23, 9 May 2024 (UTC)[reply]

Wiki99 summary

[edit]

Summary of changes as a result of the Wiki99 project (before,after,diff):

  • Complete rewrite according to recent, reliable sources
  • Fix unsourced content issues
  • Add sections about vulnerability management, lifecycle, assessment, and legal issues
  • Include content about how open source software relates to vulnerabilities

Future steps for other editors to consider:

  • Improve the coverage to be even more comprehensive
  • Update the article in response to future developments

Buidhe paid (talk)19:33, 10 May 2024 (UTC)[reply]

Merge proposal

[edit]

I propose mergingSecurity bug intoVulnerability (computer security). Both terms are synonymous. The former sounds like aneologism and has considerably less content.HourWatch (talk)14:47, 26 May 2025 (UTC)[reply]

The AfD was closed as merge, but regarding the completion of the merge, is there content fromSecurity bug usable in its current state that would help the present article? Not sure how much of it is useful, we could also just remove the content and redirect if it's already covered here.Caleb Stanford (talk)20:40, 3 July 2025 (UTC)[reply]
Retrieved from "https://en.wikipedia.org/w/index.php?title=Talk:Vulnerability_(computer_security)&oldid=1318775990"
Categories:
Hidden category:

[8]ページ先頭

©2009-2025 Movatter.jp