Question

In: Computer Science

How reliable are the advisories of vendors regarding the vulnerabilities of their own systems?

How reliable are the advisories of vendors regarding the vulnerabilities of their own systems?

Solutions

Expert Solution

Answer)
The vulnerabilities of their own systems of the vendors are to be disclosed in the vulnerability disclosure and the security issues and flaws are to be reported by the vendors and advisories. But there are certain issues regarding the vendors and the advisories of vendors when the vulnerabilities come about their own systems. The advisories and vendors prefer to keep the issues and vulnerabilities a secret for a certain period of time till they have a patch which is ready to fix the problems for the users. But the problem is that it is required that the disclosure should be made public as soon as possible and should not be withheld from the public. Thus the advisories of vendors about the vulnerabilities of their systems are not very reliable as many times, the systems are having more vulnerabilities than that they actually claim in having.

**Please Hit Like if you like my answer. For any further doubt, regarding this, please Comment**


Related Solutions

Identify at least three major concerns regarding US energy policy. What are our vulnerabilities and challenges?...
Identify at least three major concerns regarding US energy policy. What are our vulnerabilities and challenges? Discuss the merits and risks associated with one energy policy reform. You may select from the following options (or discuss your own): encouraging energy conservation and efficiency, increasing supply through more domestic production, increasing supply through alternative or renewable resources.
1) Regarding the timing of confirmations, the most reliable evidence is obtained when they are sent...
1) Regarding the timing of confirmations, the most reliable evidence is obtained when they are sent to the auditee's customers: a- several months before year-end, so the auditor will have adequate time to perform alternate procedures if they are required b- at various times throughout the year to difficult sections of the sample, so that the entire sample is representative of account balances scattered throughout the year c-at close to the balance sheet data as possible d- at various times...
Write down top 5 vulnerabilities for a vulnerability scanner and explain in your own words, why...
Write down top 5 vulnerabilities for a vulnerability scanner and explain in your own words, why this vulnerability is an issue.
Assignment Guidelines: - Submit 500 words on ERP systems vendors for business organization. - Give a...
Assignment Guidelines: - Submit 500 words on ERP systems vendors for business organization. - Give a short background about the ERP systems vendors in the selected company. - Highlight the sectors that enterprise systems vender provide. - Find out key challenges of the ERP systems vendors in business companies.
How format string vulnerabilities can be exploited for buffer overflow attacks?
How format string vulnerabilities can be exploited for buffer overflow attacks?
Search for followings CVEs and list in order of CVSS and describe the vulnerabilities and how...
Search for followings CVEs and list in order of CVSS and describe the vulnerabilities and how to address these vulnerabilities. CVE Explanation with CVSS Score. How you will address this vulnerability? CVE-2017-11882 CVE-2017-17215 CVE-2019-2725 CVE-2017-0143 CVE-2014-8361
[DATA COMMUNICATIONS] What is a vulnerability? How are vulnerabilities dealt with and what are the possible...
[DATA COMMUNICATIONS] What is a vulnerability? How are vulnerabilities dealt with and what are the possible results of leaving systems vulnerable? If a system has no vulnerabilities how is it exploited? Define Social Engineering and the types of attacks that step from Social Engineering.
1. Arachni has its own system for scoring vulnerability severity. Which vulnerabilities do you think are...
1. Arachni has its own system for scoring vulnerability severity. Which vulnerabilities do you think are the most severe/critical? Which are the least severe/critical? 2. How would you categorize the Windows Server that you scannedÑa server that stores and processes health dataÑin terms of its criticality? 3. "If you had to summarize the state of the BxB web app to GCPG's executives, what would you say?"
Describe why vendors should strive to develop Electronic health record systems that accommodate clinician’s workflow and...
Describe why vendors should strive to develop Electronic health record systems that accommodate clinician’s workflow and explain how understanding team workflows can influence health IT usability?
In at least 400 of your own words, explain how the endocrine and nervous systems work...
In at least 400 of your own words, explain how the endocrine and nervous systems work together. Next, describe the digestive process for proteins, carbohydrates, and lipids.     
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT