1,475
16
Essay, 1 pages (200 words)

Computer security

College: Computer Security What is the basic purpose behind the CVE? The main purpose of the Common Vulnerabilities and Exposures site is to provide a platform that provides synchronized information on all vulnerabilities in the information security sector. Its goal is to make it easy to share information on these vulnerability capabilities. This would involve giving common names to problems in the public domain including vulnerability repositories, tools, and services.
Describe the convention used for the identifiers of the CVE reports found on the site.
Identifiers for CVE reports are unique identities that are allocated to publicly known vulnerabilities to information security. Each identifier, therefore, represents a single vulnerability. The CVE numbering authority assigns a CVE Identifier Number to information on the potential exposure or security vulnerability as soon as it becomes available to the public. Vulnerabilities can, therefore, be distinguished from each other using these identifiers (Common Vulnerabilities and Exposures).
About how many CVE entries are currently in their database (as of 09/10/12)?
The database at CVE currently has about 58345 entries.
Approximately how many of these involve a ” buffer overflow”?
8159 entries include a buffer overflow
How many of all the CVE entries mention Internet Explorer?
1243 entries mention Microsoft Window’s ‘ Internet Explorer’ web browser in their data.
How many mention SQL?
The number of entries that mention SQL in the CVE database is approximately 20822.
Works Cited
Common Vulnerabilities and Exposures. Frequently Asked Questions, 5 July 2012. Web. 16 Sept 2012.

Thank's for Your Vote!
Computer security. Page 1
Computer security. Page 2
Computer security. Page 3

This work, titled "Computer security" was written and willingly shared by a fellow student. This sample can be utilized as a research and reference resource to aid in the writing of your own work. Any use of the work that does not include an appropriate citation is banned.

If you are the owner of this work and don’t want it to be published on AssignBuster, request its removal.

Request Removal
Cite this Essay

References

AssignBuster. (2022) 'Computer security'. 15 September.

Reference

AssignBuster. (2022, September 15). Computer security. Retrieved from https://assignbuster.com/computer-security-essay-samples-5/

References

AssignBuster. 2022. "Computer security." September 15, 2022. https://assignbuster.com/computer-security-essay-samples-5/.

1. AssignBuster. "Computer security." September 15, 2022. https://assignbuster.com/computer-security-essay-samples-5/.


Bibliography


AssignBuster. "Computer security." September 15, 2022. https://assignbuster.com/computer-security-essay-samples-5/.

Work Cited

"Computer security." AssignBuster, 15 Sept. 2022, assignbuster.com/computer-security-essay-samples-5/.

Get in Touch

Please, let us know if you have any ideas on improving Computer security, or our service. We will be happy to hear what you think: [email protected]