Vulnerability Discovery and Remediation
Techopedia explains Vulnerability Discovery and Remediation
Once software is designed, any existing vulnerabilities can be identified with the help of the following VDM algorithms:
- Anderson thermodynamic model: Originally designed for software reliability. If a number of vulnerabilities are left after executing a specified number of tests, the model assumes that when a vulnerability is encountered it is removed and no new bugs are introduced.
- Alhazmi-Malaiya logistic (AML) model: It assumes three phases in software development as rise, peak, and fall. The attention paid to software is high and increases till it reaches a peak and falls when a newer version of the software is made. The rate at which vulnerabilities are discovered is very high. It reaches saturation and starts declining, since most vulnerability gets fixed in the later stages and less attention is paid to the software.
- Rescola linear model: Vulnerability detecting tests have been defined by Rescola as linear model and exponential model statistical tests. In the former, the number of vulnerabilities discovered is divided and computed over fixed periods of time, while in the latter an exponential factor, lambda, is used to compute the vulnerability over the time period.
- Logarithmic Poisson model: It uses a logarithmic set of parameters along with a Poisson curve to determine vulnerability discovery as software development progresses. It is also known as the Musa-Okomoto model.
Survey: Why Is There Still a Gender Gap in Tech?
Do you work in the tech industry? Help us learn more about why the gender gap still exists in tech by taking this quick survey! Survey respondents will also be entered to win a $100 Amazon Gift Card!
Related Reading
- Qualitative vs Quantitative: Time to Change How We Assess the Severity of Third-Party Vulnerabilities?
- Data Breach Notification: The Legal and Regulatory Environment
- Artificial Intelligence in Cybersecurity
- The Differences Between the Top 3 Cryptocurrencies
- Hacking Cryptocurrencies
- An Introduction to Blockchain Technology