For the 2020 science fiction novel, see Cory Doctorow § Fiction.
The attack surface of a software environment is the sum of the different points (for "attack vectors") where an unauthorized user (the "attacker") can try to enter data to, extract data, control a device or critical software in an environment.[1][2] Keeping the attack surface as small as possible is a basic security measure.[3]
^"Attack Surface Analysis Cheat Sheet". Open Web Application Security Project. Retrieved 30 October 2013.
^Manadhata, Pratyusa (2008). An Attack Surface Metric(PDF). Archived (PDF) from the original on 2016-02-22. Retrieved 2013-10-30.
^Manadhata, Pratyusa; Wing, Jeannette M. "Measuring a System's Attack Surface" (PDF). Archived (PDF) from the original on 2017-03-06. Retrieved 2019-08-29. {{cite journal}}: Cite journal requires |journal= (help)
The attacksurface of a software environment is the sum of the different points (for "attack vectors") where an unauthorized user (the "attacker") can...
AttackSurface Analyzer is a tool created for the analysis of changes made to the attacksurface of the operating systems since Windows Vista and beyond...
entice them to reveal confidential information, such as passwords. Attacksurface Email attachment Malware Security hacker Spamming Vulnerability (computing)...
In the realm of application security, the term Application Portfolio AttackSurface or APAS, refers to the collective risk to an organization posed by the...
attack submarine or hunter-killer submarine is a submarine specifically designed for the purpose of attacking and sinking other submarines, surface combatants...
designed with the goals of ease of use, high speed performance, and low attacksurface. It aims to be smaller and better performing than IPsec and OpenVPN...
business substance. In March 2022, Darktrace acquired Cybersprint, a Dutch attacksurface management company, for €47.5 million. On 31 January 2023, Quintessential...
assessment, and process enhancement to find and close gaps in the digital attacksurface. It was one of the first companies to embrace and utilize crowd-sourced...
upper surface of the airfoil and begins to separate from the upper surface. On most airfoil shapes, as the angle of attack increases, the upper surface separation...
fatigue. It also provides better security by decreasing the potential attacksurface. Identity providers can facilitate connections between cloud computing...
According to comodo, applying two AttackSurface Reduction on OS/Kernel provides a materially-reduced attacksurface which results in a heightened security...
generally only attack with their aircraft, and mine hunters are not primarily combat vessels). However, some warships combine aspects of the surface combatant...
own attacksurface and invite hackers. If a reverse proxy is not configured to filter attacks or it does not receive daily updates to keep its attack signature...
refers to as "Penetration Testing as a Service" (PTaaS), as well as attacksurface management. Bugcrowd was founded in Sydney, Australia in 2012. As of...
of as software, it can have improved security, as its side channel attacksurface is reduced.[citation needed] AES-NI (or the Intel Advanced Encryption...
password also serves as the FileVault password, enabling an additional attacksurface through privilege escalation. In 2019 a vulnerability named "Thunderclap"...
long-range fire-and-forget surface-to-surface and air-to-surface anti-ship missile. The later version Mk. IV has the ability to attack land targets as well...
limited features, it has reduced servicing and management requirements, attacksurface, disk and memory usage. Andrew Mason, a program manager on the Windows...
An unmanned surface vehicle, unmanned surface vessel or uncrewed surface vessel (USV), colloquially called a drone boat, drone ship or sea drone, is a...