10 relations: Computer security, Cyberattack, Information security, IT risk, Open-source model, Software quality, Threat (computer), Vulnerability (computing), Vulnerability assessment, Weibull distribution.
Cybersecurity, computer security or IT security is the protection of computer systems from theft of or damage to their hardware, software or electronic data, as well as from disruption or misdirection of the services they provide.
A cyberattack is any type of offensive maneuver that targets computer information systems, infrastructures, computer networks, or personal computer devices.
Information security, sometimes shortened to InfoSec, is the practice of preventing unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction of information.
Information technology risk, IT risk, IT-related risk, or Cyber Risk is any risk related to information technology.
The open-source model is a decentralized software-development model that encourages open collaboration.
In the context of software engineering, software quality refers to two related but distinct notions that exist wherever quality is defined in a business context.
In computer security, a threat is a possible danger that might exploit a vulnerability to breach security and therefore cause possible harm.
In computer security, a vulnerability is a weakness which can be exploited by a Threat Actor, such as an attacker, to perform unauthorized actions within a computer system.
A vulnerability assessment is the process of identifying, quantifying, and prioritizing (or ranking) the vulnerabilities in a system.