File:Vulnerability timeline.png

Original file (2,558 × 1,400 pixels, file size: 303 KB, MIME type: image/png)

Summary

Description
English: Timeline of a hardware/software vulnerability that is exploited in a zero-day attack and later patched
Date
Source (in English) (2015) The Defender’s Dilemma: Charting a Course Toward Cybersecurity, Rand Corporation ISBN: 978-0-8330-8911-3.
Author Libicki et al.

Licensing

Public domain This chart is ineligible for copyright and therefore in the public domain, because it consists entirely of information that is common property and contains no original authorship. For more information, see Commons:Threshold of originality § Charts

العربية | Deutsch | English | español | français | italiano | 日本語 | македонски | română | русский | slovenščina | 中文(简体) | 中文(繁體) | +/−

File history

Click on a date/time to view the file as it appeared at that time.

Date/TimeThumbnailDimensionsUserComment
current02:11, 5 April 2024Thumbnail for version as of 02:11, 5 April 20242,558 × 1,400 (303 KB)Buidhe paidUploaded a work by Libicki et al. from {{cite book |last1=Libicki |first1=Martin C. |last2=Ablon |first2=Lillian |last3=Webb |first3=Tim|url=https://www.rand.org/content/dam/rand/pubs/research_reports/RR1000/RR1024/RAND_RR1024.pdf |title=The Defender’s Dilemma: Charting a Course Toward Cybersecurity |date=2015 |publisher=Rand Corporation |isbn=978-0-8330-8911-3 |language=en}} with UploadWizard

Global file usage

The following other wikis use this file:

Metadata