| property | value |
|---|---|
| dct:title | "vulnerabilities"@en |
| dct:title | "weakness"@en |
| dct:title | "Vulnerability (computing)"@en |
| dct:title | "vulnerability"@en |
| schema:description | "In computer security, a vulnerability is a weakness which allows an attacker to reduce a system's information assurance. Vulnerability is the intersection of three elements: a system susceptibility or flaw, attacker access to the flaw, and attacker capability to exploit the flaw. To exploit a vulnerability, an attacker must have at least one applicable tool or technique that can connect to a system weakness. In this frame, vulnerability is also known as the attack surface."@en |
| schema:url | https://thenextweb.com/vocabulary/vulnerability-computing/ |
| rdf:type | schema:Thing |
| rdfs:label | "vulnerabilities"@en |
| rdfs:label | "weakness"@en |
| rdfs:label | "Vulnerability (computing)"@en |
| rdfs:label | "vulnerability"@en |
| owl:sameAs | http://yago-knowledge.org/resource/Vulnerability_(computing) |
| owl:sameAs | http://rdf.freebase.com/ns/m.048vgs |
| owl:sameAs | http://dbpedia.org/resource/Vulnerability_(computing) |