1. A Software has a vulnerability which is unknown to Software's Programmer (i.e. he has no-day knowledge) but known to hacker.
2. Hacker uses it to hack the systems which have this software.
3. The Day it comes into knowledge of vender, it is the zero-day vulnerability, the next day, it will be 1-day vulnerability and so on.
4. The hacking of a system using zero-day vulnerability is called zero-day exploitation.
[ Ссылка ] .
Links to Channel's Playlists
Information Security Management: [ Ссылка ]
Network Security: [ Ссылка ]
Information Security Architecture: [ Ссылка ]
Information Security Operations: [ Ссылка ]
Information Security Testing: [ Ссылка ]
Application Security: [ Ссылка ]
Cyber Security: [ Ссылка ]
Subscribe to Channel: [ Ссылка ]
Ещё видео!