Vulnerability Discovery and Remediation
Techopedia Explains Vulnerability Discovery and Remediation
Once software is designed, any existing vulnerabilities can be identified with the help of the following VDM algorithms:
- Anderson thermodynamic model: Originally designed for software reliability. If a number of vulnerabilities are left after executing a specified number of tests, the model assumes that when a vulnerability is encountered it is removed and no new bugs are introduced.
- Alhazmi-Malaiya logistic (AML) model: It assumes three phases in software development as rise, peak, and fall. The attention paid to software is high and increases till it reaches a peak and falls when a newer version of the software is made. The rate at which vulnerabilities are discovered is very high. It reaches saturation and starts declining, since most vulnerability gets fixed in the later stages and less attention is paid to the software.
- Rescola linear model: Vulnerability detecting tests have been defined by Rescola as linear model and exponential model statistical tests. In the former, the number of vulnerabilities discovered is divided and computed over fixed periods of time, while in the latter an exponential factor, lambda, is used to compute the vulnerability over the time period.
- Logarithmic Poisson model: It uses a logarithmic set of parameters along with a Poisson curve to determine vulnerability discovery as software development progresses. It is also known as the Musa-Okomoto model.
- Qualitative vs Quantitative: Time to Change How We Assess the Severity of Third-Party Vulnerabilities?
- What AI Can Do for the Enterprise
- RDS and Trust Aware Process Mining: Keys to Trustworthy AI?
- Data Breach Notification: The Legal and Regulatory Environment
- 8 Ways to Avoid Death by PowerPoint: How to Make A Slide Deck Shine
- 5 Key Things Holding Women in Tech Back - and What Can Be Done