Discovery
A special type of vulnerability management process focuses on finding and eliminating zero-day weaknesses. This unknown vulnerability management lifecycle is a security and quality assurance process that aims to ensure the security and robustness of both in-house and third party software products by finding and fixing unknown (zero-day) vulnerabilities. The unknown vulnerability management process consists of four phases: analyze, test, report and mitigate.
- Analyze: this phase focuses on attack surface analysis
- Test: this phase focuses on fuzz testing the identified attack vectors
- Report: this phase focuses on reporting of the found issues to developers
- Mitigate: this phase looks at protective measures explained below
Read more about this topic: Zero-day Attack
Famous quotes containing the word discovery:
“The discovery of the North Pole is one of those realities which could not be avoided. It is the wages which human perseverance pays itself when it thinks that something is taking too long. The world needed a discoverer of the North Pole, and in all areas of social activity, merit was less important here than opportunity.”
—Karl Kraus (18741936)
“I have known no experience more distressing than the discovery that Negroes didnt love me. Unutterable loneliness claimed me. I felt without roots, like a man without a country ...”
—Sarah Patton Boyle, U.S. civil rights activist and author. The Desegregated Heart, part 1, ch. 10 (1962)
“The discovery of Pennsylvanias coal and iron was the deathblow to Allaire. The works were moved to Pennsylvania so hurriedly that for years pianos and the larger pieces of furniture stood in the deserted houses.”
—For the State of New Jersey, U.S. public relief program (1935-1943)