answersLogoWhite

0


Best Answer

Vulnerabilities exist because of exploits in code or networking protocols. Millions of lines of code are required to make an operating system, and sometimes vulnerabilities can be found within. It's no different than having a house and accidentally leaving a window open for a burglar to get in easily.

Unfortunately, many computer science curricula concentrate on coding projects without regard for coding securely. Security as an afterthought is not as effective as incorporating security in the beginning.

User Avatar

Wiki User

13y ago
This answer is:
User Avatar
More answers
User Avatar

Wiki User

11y ago

Computer security vulnerability can occur when one does not have proper security on a computer. It is a weakness that allows hackers and attackers to reduce ones systems information assurance.

This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: How does a computer security vulnerability occur?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

What are the different sources of system vulnerability and or abuse?

computer security and information assuarance


What is one function that is provided by a vulnerability analysis tool?

It identifies missing security updates on a computer.


Is the computer security vulnerability at risk?

"Yes, all computer security are vulnerable to risks like the Trojan and other computer viruses or spams. If you want to protect your computer, you need to buy antivirus soft-wares."


What has the author Adam Cobb written?

Adam Cobb has written: 'Australia's vulnerability to information attack' -- subject(s): Security measures, Computer security, Access control, Computer networks, Computers, Information networks


What is a vulnerability scan?

A vulnerability scan is the automated process of proactively identifying vulnerabilities of software and computing systems in a network to determine if and where a system or network can be exploited and/or threatened. Vulnerability scanning usually employs software that seeks out security flaws based on a database of known flaws, testing systems for the occurrence of these flaws and generating a report of the findings that an individual or an enterprise can use to improve the network's overall security posture. The primary goal of a vulnerability scan is to reduce the vulnerability of a software application, a database, a computer, or a network of computers to hacking, denial of service, infection, and other security risks.


What are the vulnerabilities of using security?

There are many vulnerablities of using security. The vulnerabilities depend on what type of security is being discussed. In terms of computer software security, security vulnerabilities involve weaknesses and problems that occur in a product as well as the integrity of the product. Vulnerabilities regarding home security are fewer than those involving software. One major vulnerability of home security is that the systems often run through phone lines which can be cut or damaged due to power outages.


What companies offer security vulnerability assessments to businesses?

There are many companies that offer security vulnerability assessments to businesses. The more prominent ones include Neustar, Mandiant, and Symantec.


Can you get a computer virus when your computer is connected to the internet but in standby mode?

Possibly It really depends on your vulnerability! If you have a great program for an antivirus and internet security then it's still somewhat possible but highly unlikely. It really depends on what you have for safety.


How do exploits relate to vulnerabilities?

A vulnerability indicates that a system has a flaw which can be used to circumvent the security of a system. An exploit is the way in which someone can use a vulnerability to their advantage.


Which security vulnerability is used to perform privilege escalation?

Type your answer here... Rootkit


What is relation between computer threat and computer vulnerability?

Your computer is vulnerable by the protection of your firewall. If your firewall is open, or have no firewall, you are pretty much a siting duck. A computer threat is a virus that infects your computer to do unwanted and/or involuntary actions you did not request/intend/mistakenly do. The computer threat seeks for openness of a computer vulnerability.


What is the process of vulnerability remediation?

Vulnerability remediation is the process of identifying, correcting, and preventing security vulnerabilities in systems and networks. The process typically involves identifying potential security risks, assessing and prioritizing them, and then taking steps to address the issues. This can include patching systems and applications, implementing security controls, and deploying security tools and processes. Additionally, vulnerability remediation may involve training staff, conducting regular security audits, and monitoring systems for suspicious activity.