Discovery
A special type of vulnerability management process focuses on finding and eliminating zero-day weaknesses. This unknown vulnerability management lifecycle is a security and quality assurance process that aims to ensure the security and robustness of both in-house and third party software products by finding and fixing unknown (zero-day) vulnerabilities. The unknown vulnerability management process consists of four phases: analyze, test, report and mitigate.
- Analyze: this phase focuses on attack surface analysis
- Test: this phase focuses on fuzz testing the identified attack vectors
- Report: this phase focuses on reporting of the found issues to developers
- Mitigate: this phase looks at protective measures explained below
Read more about this topic: Zero-day Attack
Famous quotes containing the word discovery:
“The new supplants the old. Yet mens minds are stuffed with outworn bunk. Educating the young in the latest findings of authorities and scholars in the social sciences is important. It is equally important to devise ways and means for aiding the middle-aged and old to reexamine hang-over unscientific doctrines and ideas in the light of recent discovery and research.”
—Mary Barnett Gilson (1877?)
“However backwards the world has been in former ages in the discovery of such points as GOD never meant us to know,we have been more successful in our own days:Mthousands can trace out now the impressions of this divine intercourse in themselves, from the first moment they received it, and with such distinct intelligence of its progress and workings, as to require no evidence of its truth.”
—Laurence Sterne (17131768)
“One of the laudable by-products of the Freudian quackery is the discovery that lying, in most cases, is involuntary and inevitablethat the liar can no more avoid it than he can avoid blinking his eyes when a light flashes or jumping when a bomb goes off behind him.”
—H.L. (Henry Lewis)