Risk, Threat, Vulnerability
来源:互联网 发布:自学粤语 知乎 编辑:程序博客网 时间:2024/05/22 09:02
•"Risk" is the potential for some unwanted event to occur
•"Threat"is the capability and intention of an adversary to undertake actions that are detrimental
•"Vulnerability" is any weakness in an asset or countermeasures that can be exploited by an adversary to cause damage to an org’s interests
一个很好的网站“Top 100 Network Security Tools” at: http://sectools.org/
Top 100 Network Security Tools
After the tremendously successful 2000 and 2003 security tools surveys, Insecure.Org is delighted to release this 2006 survey. I (Fyodor) asked users from the nmap-hackers mailing list to share their favorite tools, and 3,243 people responded. This allowed me to expand the list to 100 tools, and even subdivide them into categories. Anyone in the security field would be well advised to go over the list and investigate tools they are unfamiliar with. I discovered several powerful new tools this way. I also point newbies to this site whenever they write me saying “I don't know where to start”.
Respondents were allowed to list open source or commercial tools on any platform. Commercial tools are noted as such in the list below. No votes for the Nmap Security Scanner were counted because the survey was taken on a Nmap mailing list. This audience also biases the list slightly toward “attack” hacking tools rather than defensive ones.
一个很好的练习安全的操作系统,KNOPPIX,http://www.knopper.net/knoppix/index-en.html。
What is KNOPPIX®?
KNOPPIX is a bootable Live system on CD or DVD, consisting of a representative collection of GNU/Linux software, automatic hardware detection, and support for many graphics cards, sound cards, SCSI and USB devices and other peripherals. KNOPPIX can be used as a productive Linux system for the desktop, educational CD, rescue system, or adapted and used as a platform for commercial software product demos. It is not necessary to install anything on a hard disk. Due to on-the-fly decompression, the CD can have up to 2 GB of executable software installed on it (over 8GB on the DVD "Maxi" edition).
- Risk, Threat, Vulnerability
- Threat Intelligence-Driven Risk Analysis
- threat
- Insider Threat
- Threat Intellgence
- uva567 - Risk(Risk游戏)
- InfoSecurity 2008 Threat Analysis
- The STRIDE Threat Model
- Antivirus Company Threat Blog
- Threat Intelligence Quotient Test
- Structured Threat Information eXpression
- opensource threat Intelligence
- Threat Intelligence videos
- Open Source Threat Intelligence
- WebShell and Threat Intelligence
- 1198: Risk
- 1198: Risk
- Project Risk
- [读书笔记-2] 卓有成效的管理者-管理时间
- 梦想与现实
- 胜率排行
- WinForm ImageButton
- RFC2326 - Real Time Streaming Protocol (RTSP) 完整中英文对照版
- Risk, Threat, Vulnerability
- VoIP Infratructure
- 全面介绍Windows内存管理机制及C++内存分配实例(四):内存映射文件
- 4444444
- DOM 精简知识教程
- 支付宝Payto接口的c#.net实现
- 一个清包网友的装修清单1--给广大TX参考!清包路漫漫啊!~~~
- SAP 数据以图形模式输出源代码
- 一个清包网友的装修清单2--给广大TX参考!清包路漫漫啊!~~~