File:Vulnerability timeline.png

From Wikimedia Commons, the free media repository
Jump to navigation Jump to search

Original file(2,558 × 1,400 pixels, file size: 303 KB, MIME type: image/png)

Captions

Captions

Add a one-line explanation of what this file represents

Summary[edit]

Description
English: Timeline of a hardware/software vulnerability that is exploited in a zero-day attack and later patched
Date
Source (in English) (2015) The Defender’s Dilemma: Charting a Course Toward Cybersecurity, Rand Corporation ISBN: 978-0-8330-8911-3.
Author Libicki et al.

Licensing[edit]

Public domain This chart is ineligible for copyright and therefore in the public domain, because it consists entirely of information that is common property and contains no original authorship. For more information, see Commons:Threshold of originality § Charts

العربية | Deutsch | English | español | français | italiano | 日本語 | македонски | română | русский | slovenščina | 中文(简体) | 中文(繁體) | +/−

File history

Click on a date/time to view the file as it appeared at that time.

Date/TimeThumbnailDimensionsUserComment
current02:11, 5 April 2024Thumbnail for version as of 02:11, 5 April 20242,558 × 1,400 (303 KB)Buidhe paid (talk | contribs)Uploaded a work by Libicki et al. from {{cite book |last1=Libicki |first1=Martin C. |last2=Ablon |first2=Lillian |last3=Webb |first3=Tim|url=https://www.rand.org/content/dam/rand/pubs/research_reports/RR1000/RR1024/RAND_RR1024.pdf |title=The Defender’s Dilemma: Charting a Course Toward Cybersecurity |date=2015 |publisher=Rand Corporation |isbn=978-0-8330-8911-3 |language=en}} with UploadWizard

The following page uses this file:

File usage on other wikis

Metadata