Host Intrusion Detection System Administrator's Guide Release 3.1
Manuals
Brands
HP Manuals
Software
HP-UX Host Intrusion Detection System Software
21
22
23
24
25
26
27
28
29
30
Overview
Glossary of HP-UX HIDS T
erms
Chapter 1
16
V
ulnerability
A point at which a system can be subverted by an attacker
.
V
ulnerabilities result from flaws in coding or design.
1
...
...
28
29
30
31
32
...
...
278