Completed
Top Ten Vulnerability Types in CVE (Issues publicized between Jan 2000 and April 2001)
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
CVE Behind the Scenes - The Complexity of Being Simple
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 CVE at a Glance
- 3 CVE Editorial Board Members (As of June 4, 2001)
- 4 Vision: Using CVE in the Enterprise
- 5 CVE Enables Detailed Product Comparisons
- 6 Criteria for a Good CVE
- 7 Issue: What is a Vulnerability?
- 8 Issue: What is a Real Vulnerability?
- 9 Issue: What is a known Vulnerability?
- 10 Identifying Known Vulnerabilities: The CVE Submission Stage
- 11 Submission Conversion
- 12 Normalizing Keywords
- 13 Submission Matching
- 14 Submission Refinement
- 15 Some Challenges in Refinement
- 16 Content Decisions
- 17 Example Content Decision: SF-LOC (Software Flaws/Lines of Code)
- 18 SF-LOC Examples
- 19 Example Content Decision: SF-EXEC (Software Flaws in Multiple Executables)
- 20 Other Example Abstraction CD's
- 21 Example Inclusion CD's
- 22 Candidate Stage: Reservation
- 23 Candidate Reservation Process
- 24 CVE Growth
- 25 What's in a Name?
- 26 What's Open
- 27 Top Ten Vulnerability Types in CVE (Issues publicized between Jan 2000 and April 2001)
- 28 Managing Perspectives