什么生肖没有牙齿| 肠子有问题有什么症状| 右脚后跟疼是什么原因| 治疗阴虱子用什么药最好| 时至今日是什么意思| 闰月是什么| 洋葱不能和什么食物一起吃| 胆木是什么| ak是什么| 月经量少吃什么调理最好方法| 骨折吃什么水果好| 玙字五行属什么| 小阴唇是什么| 手足口病吃什么药| 姑姑的儿子叫什么| 祖字五行属什么| 台风什么时候结束| 高铁座位为什么没有e| 属狗的幸运色是什么颜色| 数字3五行属什么| 天秤座什么性格| sm是什么| 梦见土豆是什么意思| 雀神是什么意思| 屁股骨头疼是什么原因| 严重脱发是什么病先兆| 抽血化验挂什么科| 纺锤形是什么形状| 怎么判断自己什么脸型| 阴道骚痒是什么原因| 睾丸癌是由什么引起的| 鸡项是什么鸡| 3岁宝宝流鼻血是什么原因| 抽筋缺什么| 脖子变粗了是什么原因| 孩子半夜咳嗽是什么原因| 闻香识女人是什么意思| 黄体功能不全是什么意思| 心脏彩超能查出什么| 隐翅虫咬人后用什么药| hardy是什么意思| 风对什么| 同房是什么意思| 什么是流食| 湿气重是什么引起的| 鸡伸脖子张嘴用什么药| 脖子爱出汗是什么原因| 中指和无名指发麻是什么原因| 卵巢结节是什么意思| 针眼是什么原因引起的| 硬不起来吃什么药| 小儿积食吃什么药| 为什么空调外机不转| 心室早复极是什么意思| 蜻蜓吃什么食物| 输卵管囊肿是什么原因引起的| 肝左叶囊肿是什么意思| 经常流鼻血是什么情况| 拍拖什么意思| 海棠果什么时候成熟| 为什么疤痕会增生| 弱精是什么意思| 釜底抽薪是什么意思| 啤酒不能和什么一起吃| 为什么男生喜欢女生叫爸爸| 曹操是什么样的人| 狗肉不能和什么食物一起吃| 肩膀痛应该挂什么科| 做爱都有什么姿势| tst是什么意思| 11月17日是什么星座| 金利来属于什么档次| 科目一考试需要带什么| 梦见炖鱼预示什么| 脚痒用什么药好| 儿童中暑吃什么药| 甲基是什么| 囊性结节是什么| RHD血型阳性什么意思| 为什么今年有两个六月| 胆固醇高吃什么可以降下来| 尿白蛋白高是什么原因| 消瘦是什么意思| 鳄鱼的天敌是什么动物| 什么万| 太阳鱼是什么鱼| 什么人需要做肠镜检查| 蛇的贵人是什么生肖| 把尿是什么意思| 腹泻吃什么好| 红烧肉炖什么菜最好吃| 宫颈炎吃什么药好| 经常射精有什么伤害| 乐属于五行属什么| 小猫踩奶是什么意思| 后羿属什么生肖| 牛筋面是用什么做的| 36岁生日有什么讲究| 干贝是什么| 去脂体重什么意思| 倍感欣慰是什么意思| 平衡是什么意思| 李白有什么诗| 夏天防中暑备什么药| 口苦是什么毛病| pr值是什么意思| 什么叫银屑病| 尿白细胞十一是什么意思| 杨梅有什么功效和作用| 久坐睾丸疼是什么原因| 怀孕肚子痒是什么原因| 牙痛吃什么好| 君子兰的寓意是什么| 记性差是什么原因| 喝酒后不能吃什么药| 眼睛有红血丝是什么原因| 母亲生日送什么礼物| 臭嗨是什么意思| 酒精对皮肤有什么伤害| 预防保健科是做什么的| 宫缩是什么原因引起的| 心脏难受是什么原因| 嘴酸是什么原因引起| 什么农药最毒| 开字加一笔是什么字| 飒爽什么意思| 肾虚用什么补最好| 梦到牛是什么预兆| 植物神经紊乱挂什么科| 体检挂什么科| 荔枝都有什么品种| 贝字旁与什么有关| 精索静脉曲张是什么| 男头发稀少适合什么发型| 灰指甲用什么药好| 为什么同房后会出血| 敏感肌是什么意思| 老公梦见老婆出轨是什么意思| 向日葵是什么| 无话不谈是什么意思| 苏州为什么不建机场| 12颗珠子的手串什么意思| 职业资格证书有什么用| 发烧吃什么水果| 生命线分叉是什么意思| 梦到很多蛇是什么意思| 轻度强化是什么意思| 属猪的护身佛是什么佛| 肚子痛是什么原因| 什么是火碱| tasty是什么意思| 四月份是什么季节| 氯雷他定片什么时候吃| 慢性胃炎吃什么食物好| 哮喘是什么原因引起的| 芦荟有什么功效与作用| pvs是什么意思| 刮宫后能吃什么水果| 叶酸片什么时候吃| 外交部部长是什么级别| 骨折一个月能恢复到什么程度| 天天打喷嚏是什么原因| 什么产品美白效果最好最快| 蜂蜜水什么时候喝好| 智齿疼吃什么药最管用| 加拿大的国宝是什么动物| 痛风什么感觉| 9是什么意思| 智齿是什么牙| 炸腮有什么症状| 犬瘟是什么原因引起的| 嗓子疼吃什么药好| 腮腺炎吃什么药最管用| 肝疼是什么原因| 血糖降不下来是什么原因导致| 梵克雅宝是什么材质| 戏是什么意思| 鸡生肖配什么生肖最好| 窈窕是什么意思| 中级职称是什么| 低血压低是什么原因| 姐字五行属什么| 肩胛骨疼痛挂什么科| 骶管囊肿是什么意思| 大便颜色发黑是什么原因| 66岁属什么| 92年什么命| 肝功能2项是指什么| 一什么水壶| 大专有什么专业| 6541是什么药| 梦到怀孕生孩子是什么意思| 什么鸡蛋营养价值最高| 腰肌劳损是什么原因引起的| 苏州五行属什么| 狮子座女和什么座最配| 梦见入室抢劫意味什么| 一天老是放屁是什么原因| s和m什么意思| 11.2是什么星座| 压马路是什么意思| 上眼皮浮肿是什么原因| 吃什么药可以自杀| 白果是什么| 青盐是什么盐| 维生素d是什么东西| 夫人是什么生肖| 九月七日是什么星座| 近视眼镜是什么镜| 右眼皮跳什么预兆| 什么的黄瓜| 脑梗灶是什么意思| 商字五行属什么| 入珠是什么意思| 什么是微商| 2.6号是什么星座| 舌头发黄是什么原因| 南音是什么意思| 小白加小白等于什么| 血红蛋白是指什么| 低压高会引起什么后果| 鱼油对身体有什么好处| vans什么意思| 淋巴癌是什么| 梦见自己离婚是什么预兆| 激光脱毛挂什么科| 长方脸适合什么样的发型| 1989是什么生肖| 铁路12306什么时候放票| 月经前乳房胀痛是什么原因| 耽美剧是什么意思| 气性大是什么意思| 功什么不什么| 强心剂是什么意思| 豆腐不能和什么一起吃| 酷暑是什么意思| 大兴什么| 白带豆腐渣用什么药| avg什么意思| 地西泮是什么药| 下午三点是什么时辰| 猫吐是什么原因| 中国劲酒有什么功效| 单亲家庭什么意思| 按人中有什么作用| 卵巢囊肿有什么症状| 残联是什么性质的单位| 辣条是什么做的| 1.13是什么星座| 铁锈用什么能洗掉| 花椒有什么功效| 月子期间可以吃什么水果| 温度计代表什么生肖| 弟弟的老婆叫什么| 血脂高有什么症状表现| 梦见买帽子是什么意思| 2025年什么年| 荨麻疹是什么引起的| 自采暖是什么意思| 什么是礼仪| 可转债是什么| 菜粥里面放什么菜最好| 寂寞的反义词是什么| 天灾人祸什么意思| 百度Jump to content

崇德重礼 德法相依--从弘扬中华优秀传统文化说起

From Wikipedia, the free encyclopedia
(Redirected from Vulnerability (computing))
百度 除了桃棓这一形式以外,桃木的武器化巫术应用还有始于周礼中的桃弧棘矢,《左传》、《史记》等书中,皆有当时的天子诸侯以桃木为弓、牡棘为箭,扎草人或土偶象鬼以射,驱除不祥的传统风俗记录。

Vulnerabilities are flaws or weaknesses in a system's design, implementation, or management that can be exploited by a malicious actor to compromise its security.

Despite a system administrator's best efforts to achieve complete correctness, virtually all hardware and software contain bugs where the system does not behave as expected. If the bug could enable an attacker to compromise the confidentiality, integrity, or availability of system resources, it can be considered a vulnerability. Insecure software development practices as well as design factors such as complexity can increase the burden of vulnerabilities.

Vulnerability management is a process that includes identifying systems and prioritizing which are most important, scanning for vulnerabilities, and taking action to secure the system. Vulnerability management typically is a combination of remediation, mitigation, and acceptance.

Vulnerabilities can be scored for severity according to the Common Vulnerability Scoring System (CVSS) and added to vulnerability databases such as the Common Vulnerabilities and Exposures (CVE) database. As of November 2024, there are more than 240,000 vulnerabilities catalogued in the CVE database.[1]

A vulnerability is initiated when it is introduced into hardware or software. It becomes active and exploitable when the software or hardware containing the vulnerability is running. The vulnerability may be discovered by the administrator, vendor, or a third party. Publicly disclosing the vulnerability (through a patch or otherwise) is associated with an increased risk of compromise, as attackers can use this knowledge to target existing systems before patches are implemented. Vulnerabilities will eventually end when the system is either patched or removed from use.

Causes

[edit]

Despite a system administrator's best efforts, virtually all hardware and software contain bugs.[2] If a bug creates a security risk, it is called a vulnerability.[3][4][5] Software patches are often released to fix identified vulnerabilities, but zero-days are still liable for exploitation.[6] Vulnerabilities vary in their ability to be exploited by malicious actors, and the actual risk is dependent on the nature of the vulnerability as well as the value of the surrounding system.[7] Although some vulnerabilities can only be used for denial of service attacks, more dangerous ones allow the attacker to perform code injection without the user's awareness.[3] Only a minority of vulnerabilities allow for privilege escalation, which is typically necessary for more severe attacks.[8] Without a vulnerability, an exploit typically cannot gain access.[9] It is also possible for malware to be installed directly, without an exploit, through social engineering or poor physical security such as an unlocked door or exposed port.[10]

Design factors

[edit]

Vulnerabilities can be worsened by poor design factors, such as:

  • Complexity: Large, complex systems increase the possibility of flaws and unintended access points.[11]
  • Familiarity: Using common, well-known code, software, operating systems, and/or hardware increases the probability an attacker has or can find the knowledge and tools to exploit the flaw.[12] However, using well-known software, particularly free and open-source software, comes with the benefit of having more frequent and reliable software patches for any discovered vulnerabilities.[citation needed]
  • Connectivity: any system connected to the internet can be accessed and compromised. Disconnecting systems from the internet can be extremely effective at preventing attacks, but it is not always feasible.[13]
  • Legacy software and hardware is at increased risk by nature.[14] System administrators should consider upgrading from legacy systems, but this is often prohibitive in terms of cost and downtime.[citation needed]

Development factors

[edit]

Some software development practices can affect the risk of vulnerabilities being introduced to a code base. Lack of knowledge about secure software development or excessive pressure to deliver features quickly can lead to avoidable vulnerabilities to enter production code, especially if security is not prioritized by the company culture. This can lead to unintended vulnerabilities. The more complex the system is, the easier it is for vulnerabilities to go undetected. Some vulnerabilities are deliberately planted, which could be for any reason from a disgruntled employee selling access to cyber criminals, to sophisticated state-sponsored schemes to introduce vulnerabilities to software.

Poor software development practices can affect the likelihood of introducing vulnerabilities to a code base. Lack of knowledge or training regarding secure software development, excessive pressure to deliver, or an excessively complex code base can all allow vulnerabilities to be introduced and left unnoticed. These factors can also be exacerbated if security is not prioritized by the company culture. [15] Inadequate code reviews can also lead to missed bugs, but there are also static code analysis tools that can be used during the code review process to help find some vulnerabilities.[16]

DevOps, a development workflow that emphasizes automated testing and deployment to speed up the deployment of new features, often requires that many developers be granted access to change configurations, which can lead to deliberate or inadvertent inclusion of vulnerabilities.[17] Compartmentalizing dependencies, which is often part of DevOps workflows, can reduce the attack surface by paring down dependencies to only what is necessary.[18] If software as a service is used, rather than the organization's own hardware and software, the organization is dependent on the cloud services provider to prevent vulnerabilities.[19]

National Vulnerability Database classification

[edit]

The National Vulnerability Database classifies vulnerabilities into eight root causes that may be overlapping, including:[20]

  1. Input validation vulnerabilities exist when input checking is not sufficient to prevent the attacker from injecting malicious code. Buffer overflow exploits, buffer underflow exploits, and boundary condition exploits typically take advantage of this category.[21]
  2. Access control vulnerabilities enable an attacker to access a system that is supposed to be restricted to them, or engage in privilege escalation.[21]
  3. When the system fails to handle and exceptional or unanticipated condition correctly, an attacker can exploit the situation to gain access.[22]
  4. Configuration vulnerability come into existence when configuration settings cause risks to the system security, leading to such faults as unpatched software or file system permissions that do not sufficiently restrict access.[22]
  5. A race condition—when timing or other external factors change the outcome and lead to inconsistent or unpredictable results—can cause a vulnerability.[22]

Vulnerabilities by component

[edit]

Hardware

[edit]

Deliberate security bugs can be introduced during or after manufacturing and cause the integrated circuit not to behave as expected under certain specific circumstances. Testing for security bugs in hardware is quite difficult due to limited time and the complexity of twenty-first century chips,[23] while the globalization of design and manufacturing has increased the opportunity for these bugs to be introduced by malicious actors.[24]

Operating system

[edit]

Although operating system vulnerabilities vary depending on the operating system in use, a common problem is privilege escalation bugs that enable the attacker to gain more access than they should be allowed. Open-source operating systems such as Linux and Android have a freely accessible source code and allow anyone to contribute, which could enable the introduction of vulnerabilities. However, the same vulnerabilities also occur in proprietary operating systems such as Microsoft Windows and Apple operating systems.[25] All reputable vendors of operating systems provide patches regularly.[26]

Client–server applications

[edit]

Client–server applications are downloaded onto the end user's computers and are typically updated less frequently than web applications. Unlike web applications, they interact directly with a user's operating system. Common vulnerabilities in these applications include:[27]

Web applications

[edit]

Web applications run on many websites. Because they are inherently less secure than other applications, they are a leading source of data breaches and other security incidents.[28][29] They can include:

Attacks used against vulnerabilities in web applications include:

Management

[edit]

There is little evidence about the effectiveness and cost-effectiveness of different cyberattack prevention measures.[32] Although estimating the risk of an attack is not straightforward, the mean time to breach and expected cost can be considered to determine the priority for remediating or mitigating an identified vulnerability and whether it is cost effective to do so.[33] Although attention to security can reduce the risk of attack, achieving perfect security for a complex system is impossible, and many security measures have unacceptable cost or usability downsides.[34] For example, reducing the complexity and functionality of the system is effective at reducing the attack surface.[35]

Successful vulnerability management usually involves a combination of remediation (closing a vulnerability), mitigation (increasing the difficulty, and reducing the consequences, of exploits), and accepting some residual risk. Often a defense in depth strategy is used for multiple barriers to attack.[36] Some organizations scan for only the highest-risk vulnerabilities as this enables prioritization in the context of lacking the resources to fix every vulnerability.[37] Increasing expenses is likely to have diminishing returns.[33]

Remediation

[edit]

Remediation fixes vulnerabilities, for example by downloading a software patch.[38] Vulnerability scanners are typically unable to detect zero-day vulnerabilities, but are more effective at finding known vulnerabilities based on a database. These systems can find some known vulnerabilities and advise fixes, such as a patch.[39][40] However, they have limitations including false positives.[38]

Vulnerabilities can only be exploited when they are active-the software in which they are embedded is actively running on the system.[41] Before the code containing the vulnerability is configured to run on the system, it is considered a carrier.[42] Dormant vulnerabilities can run, but are not currently running. Software containing dormant and carrier vulnerabilities can sometimes be uninstalled or disabled, removing the risk.[43] Active vulnerabilities, if distinguished from the other types, can be prioritized for patching.[41]

Vulnerability mitigation is measures that do not close the vulnerability, but make it more difficult to exploit or reduce the consequences of an attack.[44] Reducing the attack surface, particularly for parts of the system with root (administrator) access, and closing off opportunities for exploits to engage in privilege exploitation is a common strategy for reducing the harm that a cyberattack can cause.[38] If a patch for third-party software is unavailable, it may be possible to temporarily disable the software.[45]

Testing

[edit]

A penetration test attempts to enter the system via an exploit to see if the system is insecure.[46] If a penetration test fails, it does not necessarily mean that the system is secure.[47] Some penetration tests can be conducted with automated software that tests against existing exploits for known vulnerabilities.[48] Other penetration tests are conducted by trained hackers. Many companies prefer to contract out this work as it simulates an outsider attack.[47]

Vulnerability lifecycle

[edit]
Vulnerability timeline

The vulnerability lifecycle begins when vulnerabilities are introduced into hardware or software.[49] Detection of vulnerabilities can be by the software vendor, or by a third party. In the latter case, it is considered most ethical to immediately disclose the vulnerability to the vendor so it can be fixed.[50] Government or intelligence agencies buy vulnerabilities that have not been publicly disclosed and may use them in an attack, stockpile them, or notify the vendor.[51] As of 2013, the Five Eyes (United States, United Kingdom, Canada, Australia, and New Zealand) captured the plurality of the market and other significant purchasers included Russia, India, Brazil, Malaysia, Singapore, North Korea, and Iran.[52] Organized criminal groups also buy vulnerabilities, although they typically prefer exploit kits.[53]

Even vulnerabilities that are publicly known or patched are often exploitable for an extended period.[54][55] Security patches can take months to develop,[56] or may never be developed.[55] A patch can have negative effects on the functionality of software[55] and users may need to test the patch to confirm functionality and compatibility.[57] Larger organizations may fail to identify and patch all dependencies, while smaller enterprises and personal users may not install patches.[55] Research suggests that risk of cyberattack increases if the vulnerability is made publicly known or a patch is released.[58] Cybercriminals can reverse engineer the patch to find the underlying vulnerability and develop exploits,[59] often faster than users install the patch.[58]

Vulnerabilities become deprecated when the software or vulnerable versions fall out of use.[50] This can take an extended period of time; in particular, industrial software may not be feasible to replace even if the manufacturer stops supporting it.[60]

Assessment, disclosure, and inventory

[edit]

Assessment

[edit]

A commonly used scale for assessing the severity of vulnerabilities is the open-source specification Common Vulnerability Scoring System (CVSS). CVSS evaluates the possibility to exploit the vulnerability and compromise data confidentiality, availability, and integrity. It also considers how the vulnerability could be used and how complex an exploit would need to be. The amount of access needed for exploitation and whether it could take place without user interaction are also factored in to the overall score.[61][62]

Disclosure

[edit]

Someone who discovers a vulnerability may disclose it immediately (full disclosure) or wait until a patch has been developed (responsible disclosure, or coordinated disclosure). The former approach is praised for its transparency, but the drawback is that the risk of attack is likely to be increased after disclosure with no patch available.[63] Some vendors pay bug bounties to those who report vulnerabilities to them.[64][65] Not all companies respond positively to disclosures, as they can cause legal liability and operational overhead.[66] There is no law requiring disclosure of vulnerabilities.[67] If a vulnerability is discovered by a third party that does not disclose to the vendor or the public, it is called a zero-day vulnerability, often considered the most dangerous type because fewer defenses exist.[68]

Vulnerability inventory

[edit]

The most commonly used vulnerability dataset is Common Vulnerabilities and Exposures (CVE), maintained by Mitre Corporation.[69] As of November 2024, it has over 240,000 entries[1] This information is shared into other databases, including the United States' National Vulnerability Database,[69] where each vulnerability is given a risk score using Common Vulnerability Scoring System (CVSS), Common Platform Enumeration (CPE) scheme, and Common Weakness Enumeration.[citation needed] CVE and other databases typically do not track vulnerabilities in software as a service products.[39] Submitting a CVE is voluntary for companies that discovered a vulnerability.[67]

Liability

[edit]

The software vendor is usually not legally liable for the cost if a vulnerability is used in an attack, which creates an incentive to make cheaper but less secure software.[70] Some companies are covered by laws, such as PCI, HIPAA, and Sarbanes-Oxley, that place legal requirements on vulnerability management.[71]

References

[edit]
  1. ^ a b "CVE - Program Metrics". 15 November 2024.
  2. ^ Ablon & Bogart 2017, p. 1.
  3. ^ a b Ablon & Bogart 2017, p. 2.
  4. ^ Daswani & Elbayadi 2021, p. 25.
  5. ^ Seaman 2020, pp. 47–48.
  6. ^ Daswani & Elbayadi 2021, pp. 26–27.
  7. ^ Haber & Hibbert 2018, pp. 5–6.
  8. ^ Haber & Hibbert 2018, p. 6.
  9. ^ Haber & Hibbert 2018, p. 10.
  10. ^ Haber & Hibbert 2018, pp. 13–14.
  11. ^ Kakareka, Almantas (2009). "23". In Vacca, John (ed.). Computer and Information Security Handbook. Morgan Kaufmann Publications. Elsevier Inc. p. 393. ISBN 978-0-12-374354-1.
  12. ^ Krsul, Ivan (April 15, 1997). Technical Report CSD-TR-97-026. The COAST Laboratory Department of Computer Sciences, Purdue University. CiteSeerX 10.1.1.26.5435.
  13. ^ Linkov & Kott 2019, p. 2.
  14. ^ Haber & Hibbert 2018, p. 155.
  15. ^ Strout 2023, p. 17.
  16. ^ Haber & Hibbert 2018, p. 143.
  17. ^ Haber & Hibbert 2018, p. 141.
  18. ^ Haber & Hibbert 2018, p. 142.
  19. ^ Haber & Hibbert 2018, pp. 135–137.
  20. ^ Garg & Baliyan 2023, pp. 17–18.
  21. ^ a b Garg & Baliyan 2023, p. 17.
  22. ^ a b c Garg & Baliyan 2023, p. 18.
  23. ^ Salmani 2018, p. 1.
  24. ^ Salmani 2018, p. 11.
  25. ^ Garg & Baliyan 2023, pp. 20–25.
  26. ^ Sharp 2024, p. 271.
  27. ^ a b c Strout 2023, p. 15.
  28. ^ a b c d Strout 2023, p. 13.
  29. ^ Haber & Hibbert 2018, p. 129.
  30. ^ a b c d e Strout 2023, p. 14.
  31. ^ Strout 2023, pp. 14–15.
  32. ^ Agrafiotis et al. 2018, p. 2.
  33. ^ a b Haber & Hibbert 2018, pp. 97–98.
  34. ^ Tjoa et al. 2024, p. 63.
  35. ^ Tjoa et al. 2024, pp. 68, 70.
  36. ^ Magnusson 2020, p. 34.
  37. ^ Haber & Hibbert 2018, pp. 166–167.
  38. ^ a b c Haber & Hibbert 2018, p. 11.
  39. ^ a b Strout 2023, p. 8.
  40. ^ Haber & Hibbert 2018, pp. 12–13.
  41. ^ a b Haber & Hibbert 2018, p. 84.
  42. ^ Haber & Hibbert 2018, p. 85.
  43. ^ Haber & Hibbert 2018, pp. 84–85.
  44. ^ Magnusson 2020, p. 32.
  45. ^ Magnusson 2020, p. 33.
  46. ^ Haber & Hibbert 2018, p. 93.
  47. ^ a b Haber & Hibbert 2018, p. 96.
  48. ^ Haber & Hibbert 2018, p. 94.
  49. ^ Strout 2023, p. 16.
  50. ^ a b Strout 2023, p. 18.
  51. ^ Libicki, Ablon & Webb 2015, p. 44.
  52. ^ Perlroth 2021, p. 145.
  53. ^ Libicki, Ablon & Webb 2015, pp. 44, 46.
  54. ^ Ablon & Bogart 2017, p. 8.
  55. ^ a b c d Sood & Enbody 2014, p. 42.
  56. ^ Strout 2023, p. 26.
  57. ^ Libicki, Ablon & Webb 2015, p. 50.
  58. ^ a b Libicki, Ablon & Webb 2015, pp. 49–50.
  59. ^ Strout 2023, p. 28.
  60. ^ Strout 2023, p. 19.
  61. ^ Strout 2023, pp. 5–6.
  62. ^ Haber & Hibbert 2018, pp. 73–74.
  63. ^ "Ask an Ethicist: Vulnerability Disclosure". Association for Computing Machinery's Committee on Professional Ethics. 17 July 2018. Retrieved 3 May 2024.
  64. ^ O'Harrow 2013, p. 18.
  65. ^ Libicki, Ablon & Webb 2015, p. 45.
  66. ^ Strout 2023, p. 36.
  67. ^ a b Haber & Hibbert 2018, p. 110.
  68. ^ Strout 2023, p. 22.
  69. ^ a b Strout 2023, p. 6.
  70. ^ Sloan & Warner 2019, pp. 104–105.
  71. ^ Haber & Hibbert 2018, p. 111.

Sources

[edit]
[edit]
暨怎么读什么意思 舌头痛挂什么科 萝莉控是什么意思 毛躁是什么意思 锡兵是什么
炖鸡汤放什么材料好吃 福祸相依什么意思 女性肝阳上亢吃什么药 生肖鸡和什么生肖最配 去火喝什么茶最好
民政局局长什么级别 脸黄是什么原因造成的 低钠有什么症状和危害 tb是什么意思 胆结石什么原因引起的
艺人是什么意思 鼻子干痒是什么原因 白细胞计数偏高是什么原因 命格是什么意思 进去是什么感觉
百分点是什么意思hcv8jop7ns3r.cn 脑萎缩吃什么药能控制hcv7jop5ns5r.cn ab型血和o型血生的孩子是什么血型hcv9jop5ns4r.cn 女人吃什么养肝排毒hcv8jop8ns7r.cn 滑膜炎吃什么药能治好hcv8jop8ns2r.cn
开什么店最赚钱投资小cl108k.com 过敏能吃什么youbangsi.com 兴渠是什么菜hcv7jop9ns2r.cn 耳朵里面疼什么原因hcv8jop2ns5r.cn 正常精液是什么颜色hcv8jop0ns4r.cn
wa是什么意思inbungee.com 抗心磷脂抗体是什么hcv8jop3ns8r.cn 小河边有什么hcv7jop6ns3r.cn 女人排卵是什么时候hcv8jop1ns1r.cn 戏是什么生肖hcv9jop4ns8r.cn
肾上腺彩超是检查什么jasonfriends.com 小宇宙是什么意思hcv9jop1ns2r.cn 睡眠不好用什么泡脚shenchushe.com 螨虫用什么药可以杀死它hcv9jop3ns7r.cn pt950是什么金hcv8jop9ns3r.cn
百度