National Vulnerability Database

National Vulnerability Database

The National Vulnerability Database is the U.S. government repository of standards based vulnerability management data represented using the Security Content Automation Protocol (SCAP). This data enables automation of vulnerability management, security measurement, and compliance. NVD includes databases of security checklists, security related software flaws, misconfigurations, product names, and impact metrics. NVD supports the Information Security Automation Program (ISAP).

External links



Wikimedia Foundation. 2010.

Игры ⚽ Поможем написать реферат

Look at other dictionaries:

  • National Consortium for the Study of Terrorism and Responses to Terrorism — The National Consortium for the Study of Terrorism and Responses to Terrorism (START) is a counter terrorism research center based at the University of Maryland, College Park. It is a Homeland Security Center of Excellence. It informs decisions… …   Wikipedia

  • Security Content Automation Protocol — The Security Content Automation Protocol (SCAP) is a method for using specific standards to enable automated vulnerability management, measurement, and policy compliance evaluation (e.g., FISMA compliance). The National Vulnerability Database… …   Wikipedia

  • Information Security Automation Program — The Information Security Automation Program (ISAP, pronounced “I Sap”) is a U.S. government multi agency initiative to enable automation and standardization of technical security operations. While a U.S. government initiative, its standards based …   Wikipedia

  • Stuxnet — is a computer worm discovered in June 2010. It targets Siemens industrial software and equipment running Microsoft Windows.[1] While it is not the first time that hackers have targeted industrial systems,[2] it is the first discovered malware… …   Wikipedia

  • CVSS — Common Vulnerability Scoring System (CVSS) is an industry standard for assessing the severity of computer system security vulnerabilities. It attempts to establish a measure of how much concern a vulnerability warrants, compared to other… …   Wikipedia

  • Common Vulnerabilities and Exposures — The Common Vulnerabilities and Exposures or CVE system provides a reference method for publicly known information security vulnerabilities and exposures. MITRE Corporation maintains the system, with funding from the National Cyber Security… …   Wikipedia

  • Межсайтовый скриптинг — XSS (англ. Сross Site Sсriрting  «межсайтовый скриптинг»)  тип атаки на уязвимые интерактивные информационные системы в вебе. XSS применяется, когда в генерируемые сервером страницы возможно внедрить клиентские скрипты, но не… …   Википедия

  • CVSS — Das Common Vulnerability Scoring System (wörtlich übersetzt: „Gebräuchliches Verwundbarkeitsbewertungssystem“) , abgekürzt CVSS, ist ein Industriestandard zur Beschreibung des Schweregrades von Sicherheitslücken in Computer Systemen. Im CVSS… …   Deutsch Wikipedia

  • Cross-site request forgery — Cross site request forgery, also known as a one click attack or session riding and abbreviated as CSRF (pronounced sea surf[1]) or XSRF, is a type of malicious exploit of a website whereby unauthorized commands are transmitted from a user that… …   Wikipedia

  • WinNuke — The term WinNuke refers to a remote denial of service attack (DoS) that affected the Microsoft Windows 95, Microsoft Windows NT and Microsoft Windows 3.1x computer operating systems. It is responsible for the famous blue screen of death . The… …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”