Defense
In many cases, information security threats leverage well known vulnerabilities that a vendor or customers haven't fixed yet. Traditionally, this class of threat is easier to detect and defend against. Modern information security techniques are getting better at detecting zero-day exploits using a variety of techniques that are agnostic to the vulnerability being exploited. For example, a security device might first run code in a sandbox to see if it does anything suspicious such as changing operating system files.Overview: Zero Day Vulnerability | ||
Type | ||
Definition | A security flaw in software or hardware that is unreported and unknown to the vendor. | |
Related Concepts | Information SecurityAdvanced Persistent ThreatDefensive Computing |