What are the vulnerabilities according to the extended CERT
Taxonomy?
Answer Posted / prabhukumar
Boundary Condition Errors,Input validation Errors,Access
Validation Errors,Synchronization Errors,Synchronization
Errors,Environment Errors
Is This Answer Correct ? | 3 Yes | 0 No |
Post New Answer View All Answers
What is difference between discretionary access control and mandatory access control?
What is the difference between cybersecurity and information security?
Explain abouT Security Life Cycle.
Explain what does cia stand for in security management?
Explain how does traceroute work? Now how does traceroute make sure that the packet follows the same path that a previous (with ttl - 1) probe packet went in?
How long can a ddos attack last?
What a security mean in your sense?
What does cia stand for in security management?
What is information security?
What is remote access vpn?
What is trojan virus?
What is the difference between a virus and malware?
How to you keep yourself updated on network security ?
What are the different aspects of shadow it?
explain how do we do authentication with message digest(md5)? (Usually md is used for finding tampering of data)