O'Reilly logo

BackTrack 4: Assuring Security by Penetration Testing by Shakeel Ali, Tedi Heriyanto

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Vulnerability taxonomy

With an increase in the number of technologies over the past few years, there have been various attempts to introduce the best taxonomy which could categorize all the common set of vulnerabilities. However, no single taxonomy has been produced to represent all the common coding mistakes that may affect the system security. This is due to the fact that a single vulnerability may fall into more than one category or class. Additionally, every system platform has its own base for connectivity, complexity, and extensibility to interact with its environment. Thus, the taxonomy standards we have presented in the following table help you identify most of the security glitches whenever possible. It is also vital to note that most ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required