Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Zero-Day Attack

Encyclopedia of Information Science and Technology, Second Edition
An attack that takes advantage of a newly discovered, previously unknown vulnerability in a software product. Perpetrators attack the vulnerability before the software vendor can prepare a patch for the vulnerability.
Published in Chapter:
An Overview of Threats to Information Security
R. Kelly Rainer Jr. (Auburn University, USA)
DOI: 10.4018/978-1-60566-026-4.ch478
Abstract
Organizations and individuals have many information assets, which are subject to an increasing number of threats. The purpose of this article is to provide (1) an overview of the factors that are increasing the threats to information security and (2) an overview of the threats to information security.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
Computer Fraud Challenges and Its Legal Implications
This term has been used in various forms and meaning. It terms of this chapter, this term refers to exploitable software or hardware vulnerabilities that have been attacked when there has been no previous information of a system flaw by the general information security community. In such a situation, unfortunately, there is no vendor fix or software security patch that have been developed or made available to the public to correct or protect against such an attack.
Full Text Chapter Download: US $37.50 Add to Cart
Automotive Vehicle Security Standards, Regulations, and Compliance
A software vulnerability that has already been hacked meaning that the time for the developer to respond to prevent the attack has already passed.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR