Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Exploit

Encyclopedia of Information Science and Technology, Third Edition
An action that takes advantage of weaknesses or vulnerabilities in software or hardware.
Published in Chapter:
Marketing Vulnerabilities in an Age of Online Commerce
Robert S. Owen (Texas A&M University, USA)
DOI: 10.4018/978-1-4666-5888-2.ch533
Full Text Chapter Download: US $37.50 Add to Cart
More Results
Full Text Chapter Download: US $37.50 Add to Cart
Network Worms
Code written to take advantage of a specific vulnerability.
Full Text Chapter Download: US $37.50 Add to Cart
Intrusion Detection Based on P2P Software
A small program which is designed specifically to attack a certain vulnerability in a system. These are dangerous, while their use requires no skills, and they are usually published shortly after a disclosure of a vulnerability.
Full Text Chapter Download: US $37.50 Add to Cart
Marketing Vulnerabilities in an Age of Online Commerce
An action that takes advantage of weaknesses or vulnerabilities in software or hardware.
Full Text Chapter Download: US $37.50 Add to Cart
Web Authorization Protocols
A piece of software that takes advantage of vulnerabilities in applications, networks, or hardware.
Full Text Chapter Download: US $37.50 Add to Cart
Malicious Software
Software written to take advantage of a specific vulnerability.
Full Text Chapter Download: US $37.50 Add to Cart
Current Challenges in Intrusion Detection Systems
Taking advantage of a software vulnerability to carry out an attack. To minimize the risk of exploits, security updates, or software patches should be applied frequently.
Full Text Chapter Download: US $37.50 Add to Cart
Honeypots and Honeynets: Analysis and Case Study
Piece of software that takes advantage of a security vulnerability with the intention of obtaining a behaviour undesired by the legitimate user. Exploits are not malicious code themselves: they are usually used as a first step for other purposes like non-authorized access or malware propagation.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR