Jump to ContentJump to Main Navigation
A Vulnerable SystemThe History of Information Security in the Computer Age$
Users without a subscription are not able to see the full content.

Andrew J. Stewart

Print publication date: 2021

Print ISBN-13: 9781501758942

Published to Cornell Scholarship Online: January 2022

DOI: 10.7591/cornell/9781501758942.001.0001

Show Summary Details
Page of

PRINTED FROM Cornell University Press SCHOLARSHIP ONLINE (www.cornell.universitypressscholarship.com). (c) Copyright University of Cornell University Press, 2022. All Rights Reserved. An individual user may print out a PDF of a single chapter of a monograph in Cornell for personal use. date: 28 June 2022

Vulnerability Disclosure, Bounties, and Markets

Vulnerability Disclosure, Bounties, and Markets

Chapter:
(p.127) Chapter 7 Vulnerability Disclosure, Bounties, and Markets
Source:
A Vulnerable System
Author(s):

Andrew J. Stewart

Publisher:
Cornell University Press
DOI:10.7591/cornell/9781501758942.003.0008

This chapter focuses on the obsession with technical security vulnerabilities at the beginning of the twenty-first century. A vulnerability that is not common knowledge and for which no patch has yet been released is referred to as a zero-day vulnerability. The term zero-day refers to the fact that there have been zero-days' advance warning, meaning no days, regarding the risk that the security vulnerability represents. Security technologies such as intrusion detection systems and antivirus software normally try to detect known patterns of attack and so typically would be unlikely to detect the use of a zero-day vulnerability. The chapter then looks at stunt hacking, which was portrayed as a way to draw attention to dangerous vulnerabilities. What went unsaid was that stunt hacking was a means by which hackers and commercial security companies could promote themselves and their technical skill sets.

Keywords:   technical security vulnerabilities, zero-day vulnerability, security technologies, intrusion detection systems, antivirus software, stunt hacking, computer hackers, commercial security companies

Cornell Scholarship Online requires a subscription or purchase to access the full text of books within the service. Public users can however freely search the site and view the abstracts and keywords for each book and chapter.

Please, subscribe or login to access full text content.

If you think you should have access to this title, please contact your librarian.

To troubleshoot, please check our FAQs, and if you can't find the answer there, please contact us.