HOME

TheInfoList



OR:

In
computing Computing is any goal-oriented activity requiring, benefiting from, or creating computing machinery. It includes the study and experimentation of algorithmic processes, and development of both hardware and software. Computing has scientific, e ...
, a structural vulnerability is an IT system weakness that consists of several so-called component vulnerabilities. This type of weakness generally emerges due to several
system architecture A system architecture is the conceptual model that defines the structure, behavior, and more views of a system. An architecture description is a formal description and representation of a system, organized in a way that supports reasoning about the ...
flaws. An example of a structural vulnerability is a person working in a critical part of the system with no security training, who doesn’t follow the software patch cycles and who is likely to disclose critical information in a
phishing Phishing is a type of social engineering where an attacker sends a fraudulent (e.g., spoofed, fake, or otherwise deceptive) message designed to trick a person into revealing sensitive information to the attacker or to deploy malicious softwar ...
attack.


References

{{reflist Vulnerability Computer security exploits Hacking (computer security)