File:Vulnerability timeline.png

Page contents not supported in other languages.
This is a file from the Wikimedia Commons
From Wikipedia, the free encyclopedia

Original file(2,558 × 1,400 pixels, file size: 303 KB, MIME type: image/png)

Summary

Description
English: Timeline of a hardware/software vulnerability that is exploited in a zero-day attack and later patched
Date
Source (in English) (2015) The Defender’s Dilemma: Charting a Course Toward Cybersecurity, Rand Corporation ISBN: 978-0-8330-8911-3.
Author Libicki et al.

Licensing

Public domain This chart is ineligible for copyright and therefore in the public domain, because it consists entirely of information that is common property and contains no original authorship. For more information, see Commons:Threshold of originality § Charts

العربية | Deutsch | English | español | français | italiano | 日本語 | македонски | română | русский | slovenščina | 中文(简体) | 中文(繁體) | +/−

File history

Click on a date/time to view the file as it appeared at that time.

Date/TimeThumbnailDimensionsUserComment
current02:11, 5 April 2024Thumbnail for version as of 02:11, 5 April 20242,558 × 1,400 (303 KB)Buidhe paidUploaded a work by Libicki et al. from {{cite book |last1=Libicki |first1=Martin C. |last2=Ablon |first2=Lillian |last3=Webb |first3=Tim|url=https://www.rand.org/content/dam/rand/pubs/research_reports/RR1000/RR1024/RAND_RR1024.pdf |title=The Defender’s Dilemma: Charting a Course Toward Cybersecurity |date=2015 |publisher=Rand Corporation |isbn=978-0-8330-8911-3 |language=en}} with UploadWizard
The following pages on the English Wikipedia use this file (pages on other projects are not listed):

Metadata