File:Vulnerability timeline.png

Original file(2,558 × 1,400 pixels, file size: 303 KB, MIME type: image/png)

Commons-logo.svg This is a file from the Wikimedia Commons. The description on its description page there is shown below.
Commons is a freely licensed media file repository. You can help.

Summary

Description
English: Timeline of a hardware/software vulnerability that is exploited in a zero-day attack and later patched
Date
Source (in English) (2015) The Defender’s Dilemma: Charting a Course Toward Cybersecurity, Rand Corporation ISBN: 978-0-8330-8911-3.
Author Libicki et al.

Licensing

Public domain This chart is ineligible for copyright and therefore in the public domain, because it consists entirely of information that is common property and contains no original authorship. For more information, see Commons:Threshold of originality § Charts

العربية | Deutsch | English | español | français | italiano | 日本語 | македонски | română | русский | slovenščina | 中文(简体) | 中文(繁體) | +/−

File history

Click on a date/time to view the file as it appeared at that time.

Date/TimeDimensionsUserComment
current18:11, 4 April 20242,558 × 1,400 (303 KB)Buidhe paidUploaded a work by Libicki et al. from {{cite book |last1=Libicki |first1=Martin C. |last2=Ablon |first2=Lillian |last3=Webb |first3=Tim|url=https://www.rand.org/content/dam/rand/pubs/research_reports/RR1000/RR1024/RAND_RR1024.pdf |title=The Defender’s Dilemma: Charting a Course Toward Cybersecurity |date=2015 |publisher=Rand Corporation |isbn=978-0-8330-8911-3 |language=en}} with UploadWizard

The following page uses this file:

Metadata