Ukuphepha kwesicikizi

ukulondeka kwezinhlelo zesicikizi ekudalulweni, ukwebiwa nokulinyazwa kokwaziswa

Ukuphepha kwesicikizi, ilondosicikizi, noma ukuphepha kwezezibhangqiwe, kuwukulondeka kwezinhlelo namaxhoxho wesicikizi ekuhlaseleni kwalabo abahlose okubi nokungaholela ekudalulweni okungagunyaziwe kokwaziswa, ukwebiwa, noma ukulimala kwezigcoyi, amahlelokusebenza, noma imininingo, kanye nokuthikamezeka noma ukunhlanhlatha kwezinkonzo ezihlinzekwayo.[1]

Nakuba izici eziningi zelondosicikizi zihlanganisa izinyathelo zezezibhangqiwe ezifana nemiphonsozwi kanye nokunyandla ngesigabuzuba, izinyathelo zokuphepha ezingokoqobo ezinjengezingidi zensimbi zisasetshenziswa ukuvimbela ukuphazamiseka okungagunyaziwe.

Lomkhakha ubalulekile ngenxa yokwanda kokwethembela ezinhlelweni zesicikizi, kuxhakaxholo,[2] nezivamiso zoxhoxho oluswelintambo ezifana ne-Bluetooth Kanye ne-Wi-fi. Futhi, ngenxa yokwanda kwezilekeleli ezintwesi, ezihlanganisa omabonakude, nomakhalipha, kanye nezilekeleli ezakha uXhakaxholo lwezinto. Ilondosicikizi lungenye lwezinselele ezinkulu zanamuhla, ngenxa yobunkimbinkimbi bezinhlelo zokwaziswa kanye nemiphakathi eziyisekayo. Ukulondeka kubaluleke kakhulu ezimisweni ezilawula izinhlelo ezinkulu ezinemithelela engokoqobo ethinta okuningi, kuhlanganisa ukwabiwa kwamandla wamazuba, ukuphepha kokhetho, nezezimali.[3][4]

Ukuhlabeka nokuhlaselwa

hlela

Ukuhlabeka kuwubuthakathaka obusemklamweni, ekugunundweni, emigidingweni, noma ekulawulweni ngaphakathi kwesicikizi. Iningi lokuhlabeka oluvubukuliwe lubhaliwe kwisizindamininingo sokuhlabeka iCVE (Common Vulnerabilities and Exposures).[5] Ukuhlabeka okuxaphazekayo yilokho okunohlaselo olusebenzayo noluxaphazayo olwaziwayo.[6] Ukuhlabeka kungacwaningwa, kungcikishwe kushendele, kuzingelwe, noma kuxhashazwe ngokusebenzisa izinsiza ezihlelelekiwe noma iziqakaqo.[7][8]

Imithombo

hlela
  1. Schatz, Daniel; Bashroush, Rabih; Wall, Julie (2017). "Towards a More Representative Definition of Cyber Security" (in en). Journal of Digital Forensics, Security and Law 12 (2). ISSN 1558-7215. https://commons.erau.edu/jdfsl/vol12/iss2/8/. 
  2. Tate, Nick (7 May 2013). "Reliance spells end of road for ICT amateurs". The Australian.
  3. Kianpour, Mazaher; Kowalski, Stewart; Øverby, Harald (2021). "Systematically Understanding Cybersecurity Economics: A Survey". Sustainability 13 (24): 13677. doi:10.3390/su132413677. 
  4. Stevens, Tim (11 June 2018). "Global Cybersecurity: New Directions in Theory and Methods". Politics and Governance 6 (2): 1–4. doi:10.17645/pag.v6i2.1569. https://kclpure.kcl.ac.uk/portal/files/97261726/PaG_6_2_Global_Cybersecurity_New_Directions_in_Theory_and_Methods.pdf. 
  5. "About the CVE Program". www.cve.org. Kulandwe ngomhlaka 2023-04-12.
  6. Template:Cite conference
  7. "Ghidra". nsa.gov. 1 August 2018. Archived from the original on 15 August 2020. Kulandwe ngomhlaka 17 August 2020. Unknown parameter |url-status= ignored (help)
  8. Larabel, Michael (2017-12-28). "Syzbot: Google Continuously Fuzzing The Linux Kernel". www.phoronix.com/ (in i-English). Kulandwe ngomhlaka 2021-03-25.