Logo
Unionpedia
Communication
Get it on Google Play
New! Download Unionpedia on your Android™ device!
Free
Faster access than browser!
And Ads-free!

Zero-day (computing)

A zero-day (also known as zero-hour or 0-day) vulnerability is an undisclosed and uncorrected computer application vulnerability that could be exploited to adversely affect the computer programs, data, additional computers or a network. [1]

46 relations: Access control, Antivirus software, Apple Inc., Application software, Behavior, Buffer overflow, C't, Complexity, Computer security, Computer virus, Computer worm, Convention on Cybercrime, Electronic signature, Exploit (computer security), Framework decision, Halting problem, Heuristic (computer science), Heuristic analysis, Internet, Linear bounded automaton, Linux, Malware, Microsoft, Microsoft Windows, Network Access Control, Network Access Protection, Network Admission Control, OS X, RFPolicy, Sandbox (computer security), Security and safety features new to Windows Vista, Simple Mail Transfer Protocol, Software-defined protection, Solaris (operating system), Static program analysis, Sun Microsystems, Symantec, Targeted threat, Timeline of computer viruses and worms, TippingPoint, United States Computer Emergency Readiness Team, Unix, Vulnerability, Vulnerability (computing), Windows Vista, Zeroday Emergency Response Team.

Access control

In the fields of physical security and information security, access control is the selective restriction of access to a place or other resource.

New!!: Zero-day (computing) and Access control · See more »

Antivirus software

Antivirus or anti-virus software (often abbreviated as AV), sometimes known as anti-malware software, is computer software used to prevent, detect and remove malicious software.

New!!: Zero-day (computing) and Antivirus software · See more »

Apple Inc.

Apple Inc. (commonly known as Apple) is an American multinational technology company headquartered in Cupertino, California, that designs, develops, and sells consumer electronics, computer software, and online services.

New!!: Zero-day (computing) and Apple Inc. · See more »

Application software

An application program (or application for short) is a computer program designed to perform a group of coordinated functions, tasks, or activities for the benefit of the user.

New!!: Zero-day (computing) and Application software · See more »

Behavior

Behavior or behaviour (see spelling differences) is the range of actions and mannerisms made by individuals, organisms, systems, or artificial entities in conjunction with themselves or their environment, which includes the other systems or organisms around as well as the (inanimate) physical environment.

New!!: Zero-day (computing) and Behavior · See more »

Buffer overflow

In computer security and programming, a buffer overflow, or buffer overrun, is an anomaly where a program, while writing data to a buffer, overruns the buffer's boundary and overwrites memory in adjacent locations.

New!!: Zero-day (computing) and Buffer overflow · See more »

C't

c't – Magazin für Computertechnik (magazine for computer technology) is a German computer magazine, published by the Heinz Heise publishing house.

New!!: Zero-day (computing) and C't · See more »

Complexity

There is no absolute definition of what complexity means; the only consensus among researchers is that there is no agreement about the specific definition of complexity.

New!!: Zero-day (computing) and Complexity · See more »

Computer security

Computer security, also known as cybersecurity or IT security, is the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they provide.

New!!: Zero-day (computing) and Computer security · See more »

Computer virus

A computer virus is a malware program that, when executed, replicates by inserting copies of itself (possibly modified) into other computer programs, data files, or the boot sector of the hard drive; when this replication succeeds, the affected areas are then said to be "infected".

New!!: Zero-day (computing) and Computer virus · See more »

Computer worm

A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers.

New!!: Zero-day (computing) and Computer worm · See more »

Convention on Cybercrime

The Convention on Cybercrime, also known as the Budapest Convention on Cybercrime or the Budapest Convention, is the first international treaty seeking to address Internet and computer crime by harmonizing national laws, improving investigative techniques, and increasing cooperation among nations.

New!!: Zero-day (computing) and Convention on Cybercrime · See more »

Electronic signature

An electronic signature, or e-signature, is any electronic means that indicates either that a person adopts the contents of an electronic message, or more broadly that the person who claims to have written a message is the one who wrote it (and that the message received is the one that was sent by this person).

New!!: Zero-day (computing) and Electronic signature · See more »

Exploit (computer security)

An exploit (from the English verb to exploit, meaning "using something to one’s own advantage") is a piece of software, a chunk of data, or a sequence of commands that takes advantage of a bug or vulnerability in order to cause unintended or unanticipated behavior to occur on computer software, hardware, or something electronic (usually computerized).

New!!: Zero-day (computing) and Exploit (computer security) · See more »

Framework decision

A framework decision was a kind of legislative act of the European Union used exclusively within the EU's competences in police and judicial co-operation in criminal justice matters.

New!!: Zero-day (computing) and Framework decision · See more »

Halting problem

In computability theory, the halting problem is the problem of determining, from a description of an arbitrary computer program and an input, whether the program will finish running or continue to run forever.

New!!: Zero-day (computing) and Halting problem · See more »

Heuristic (computer science)

In computer science, artificial intelligence, and mathematical optimization, a heuristic is a technique designed for solving a problem more quickly when classic methods are too slow, or for finding an approximate solution when classic methods fail to find any exact solution.

New!!: Zero-day (computing) and Heuristic (computer science) · See more »

Heuristic analysis

Heuristic analysis is a method employed by many computer antivirus programs designed to detect previously unknown computer viruses, as well as new variants of viruses already in the "wild".

New!!: Zero-day (computing) and Heuristic analysis · See more »

Internet

The Internet is the global system of interconnected computer networks that use the Internet protocol suite (TCP/IP) to link billions of devices worldwide.

New!!: Zero-day (computing) and Internet · See more »

Linear bounded automaton

In computer science, a linear bounded automaton (plural linear bounded automata, abbreviated LBA) is a restricted form of Turing machine.

New!!: Zero-day (computing) and Linear bounded automaton · See more »

Linux

Linux (pronounced or, less frequently) is a Unix-like and mostly POSIX-compliant computer operating system (OS) assembled under the model of free and open-source software development and distribution.

New!!: Zero-day (computing) and Linux · See more »

Malware

Malware, short for malicious software, is any software used to disrupt computer operation, gather sensitive information, or gain access to private computer systems.

New!!: Zero-day (computing) and Malware · See more »

Microsoft

Microsoft Corporation (commonly referred to as Microsoft) is an American multinational technology company headquartered in Redmond, Washington, that develops, manufactures, licenses, supports and sells computer software, consumer electronics and personal computers and services.

New!!: Zero-day (computing) and Microsoft · See more »

Microsoft Windows

Microsoft Windows (or simply Windows) is a metafamily of graphical operating systems developed, marketed, and sold by Microsoft.

New!!: Zero-day (computing) and Microsoft Windows · See more »

Network Access Control

Network Access Control (NAC) is an approach to computer security that attempts to unify endpoint security technology (such as antivirus, host intrusion prevention, and vulnerability assessment), user or system authentication and network security enforcement.

New!!: Zero-day (computing) and Network Access Control · See more »

Network Access Protection

Network Access Protection (NAP) is a Microsoft technology for controlling network access of a computer, based on its health.

New!!: Zero-day (computing) and Network Access Protection · See more »

Network Admission Control

Network Admission Control (NAC) refers to Cisco's version of Network Access Control, which restricts access to the network based on identity or security posture.

New!!: Zero-day (computing) and Network Admission Control · See more »

OS X

OS X (pronounced; originally Mac OS X) is a series of Unix-based graphical interface operating systems (OS) developed and marketed by Apple Inc. It is designed to run on Macintosh computers, having been pre-installed on all Macs since 2002.

New!!: Zero-day (computing) and OS X · See more »

RFPolicy

The RFPolicy states a method of contacting vendors about security vulnerabilities found in their products.

New!!: Zero-day (computing) and RFPolicy · See more »

Sandbox (computer security)

In computer security, a sandbox is a security mechanism for separating running programs.

New!!: Zero-day (computing) and Sandbox (computer security) · See more »

Security and safety features new to Windows Vista

There are a number of security and safety features new to Windows Vista, most of which are not available in any prior Microsoft Windows operating system release.

New!!: Zero-day (computing) and Security and safety features new to Windows Vista · See more »

Simple Mail Transfer Protocol

Simple Mail Transfer Protocol (SMTP) is an Internet standard for electronic mail (email) transmission.

New!!: Zero-day (computing) and Simple Mail Transfer Protocol · See more »

Software-defined protection

Software-defined Protection (SDP) is a computer networking security architecture and methodology that combines network security devices and defensive protections that leverage both internal and external intelligence sources.

New!!: Zero-day (computing) and Software-defined protection · See more »

Solaris (operating system)

Solaris is a Unix operating system originally developed by Sun Microsystems.

New!!: Zero-day (computing) and Solaris (operating system) · See more »

Static program analysis

Static program analysis is the analysis of computer software that is performed without actually executing programs (analysis performed on executing programs is known as dynamic analysis).

New!!: Zero-day (computing) and Static program analysis · See more »

Sun Microsystems

Sun Microsystems, Inc. was a company that sold:computers, computer components,:computer software, and:information technology services and that created the Java programming language, Solaris Unix and the Network File System (NFS).

New!!: Zero-day (computing) and Sun Microsystems · See more »

Symantec

Symantec Corporation (commonly known as Symantec) is an American technology company headquartered in Mountain View, California, United States.

New!!: Zero-day (computing) and Symantec · See more »

Targeted threat

Targeted threats are a class of malware destined for one specific organization or industry.

New!!: Zero-day (computing) and Targeted threat · See more »

Timeline of computer viruses and worms

This timeline of computer viruses and worms presents a chronology of noteworthy computer viruses, computer worms, Trojan horses, similar malware, related research and events.

New!!: Zero-day (computing) and Timeline of computer viruses and worms · See more »

TippingPoint

HP TippingPoint’s Intrusion Prevention System (IPS) deals with IT threat protection.

New!!: Zero-day (computing) and TippingPoint · See more »

United States Computer Emergency Readiness Team

The United States Computer Emergency Readiness Team (US-CERT) is an organization within the Department of Homeland Security’s (DHS) National Protection and Programs Directorate (NPPD).

New!!: Zero-day (computing) and United States Computer Emergency Readiness Team · See more »

Unix

Unix (all-caps UNIX for the trademark) is a family of multitasking, multiuser computer operating systems that derive from the original AT&T Unix, developed in the 1970s at the Bell Labs research center by Ken Thompson, Dennis Ritchie, and others.

New!!: Zero-day (computing) and Unix · See more »

Vulnerability

Vulnerability refers to the inability to withstand the effects of a hostile environment.

New!!: Zero-day (computing) and Vulnerability · See more »

Vulnerability (computing)

In computer security, a vulnerability is a weakness which allows an attacker to reduce a system's information assurance.

New!!: Zero-day (computing) and Vulnerability (computing) · See more »

Windows Vista

Windows Vista (codenamed Longhorn) is an operating system by Microsoft for use on personal computers, including home and business desktops, laptops, tablet PCs and media center PCs.

New!!: Zero-day (computing) and Windows Vista · See more »

Zeroday Emergency Response Team

In computer security, the Zeroday Emergency Response Team (ZERT) was a group of volunteer security researchers who produced emergency patches for zero day attack vulnerabilities in proprietary software.

New!!: Zero-day (computing) and Zeroday Emergency Response Team · See more »

Redirects here:

0-day attack, 0-day exploit, 0day, Day zero attack, Day zero worm, Day zero worms, Next-generation malware, Zero day attack, Zero day exploit, Zero day exploits, Zero day flaw, Zero day threat, Zero day virus, Zero day vulnerability, Zero day worm, Zero day worms, Zero hour attack, Zero-Day Attack, Zero-Day Exploit, Zero-day (software), Zero-day attack, Zero-day exploit, Zero-day malware, Zero-day virus, Zero-day vulnerability.

References

[1] https://en.wikipedia.org/wiki/Zero-day_(computing)

OutgoingIncoming
Hey! We are on Facebook now! »