HOME
*





Chinese National Vulnerability Database
The Chinese National Vulnerability Database (CNNVD) is one of two national vulnerability databases of the People's Republic of China. It is operated by the China Information Technology Security Evaluation Center (CNITSEC), the 13th Bureau of China's foreign intelligence service, the Ministry of State Security (MSS). As of September 28, 2020, the database has 117,454 vulnerabilities cataloged with the first entry dated January 1, 2010. Organization The organization is operated by the China Technology Evaluation Center (, known in English as CNITSEC), which is a subsidiary office of the MSS, making the organization closely linked to the Chinese intelligence apparatus. According to its official website, CNNVD performs "analysis and information communication of security vulnerabilities of information technology products and systems; security risk assessment of information networks and important information systems of party and government organs; safety testing and evaluation of ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Mainland China
"Mainland China" is a geopolitical term defined as the territory governed by the People's Republic of China (including islands like Hainan or Chongming), excluding dependent territories of the PRC, and other territories within Greater China. By convention, the territories that fall outside of the Chinese mainland include: * Hong Kong, a quasi-dependent territory under PRC rule that is officially designated a " Special Administrative Region of the PRC" (formerly a British colony) * Macau, a quasi-dependent territory under PRC rule that is officially designated a "Special Administrative Region of the PRC" (formerly a Portuguese colony) * Territories ruled by the Republic of China (ROC, commonly referred to as Taiwan), including the island of Taiwan, the Penghu (Pescadores) islands in the Taiwan Strait, and the islands Kinmen, Matsu, and Wuqiu (Kinmen) offshore of Fujian. Overseas Chinese, especially Malaysian Chinese and Chinese Singaporeans, use this term to descr ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Beijing
} Beijing ( ; ; ), alternatively romanized as Peking ( ), is the capital of the People's Republic of China. It is the center of power and development of the country. Beijing is the world's most populous national capital city, with over 21 million residents. It has an administrative area of , the third in the country after Guangzhou and Shanghai. It is located in Northern China, and is governed as a municipality under the direct administration of the State Council with 16 urban, suburban, and rural districts.Figures based on 2006 statistics published in 2007 National Statistical Yearbook of China and available online at archive. Retrieved 21 April 2009. Beijing is mostly surrounded by Hebei Province with the exception of neighboring Tianjin to the southeast; together, the three divisions form the Jingjinji megalopolis and the national capital region of China. Beijing is a global city and one of the world's leading centres for culture, diplomacy, politics, financ ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


China
China, officially the People's Republic of China (PRC), is a country in East Asia. It is the world's List of countries and dependencies by population, most populous country, with a Population of China, population exceeding 1.4 billion, slightly ahead of India. China spans the equivalent of five time zones and Borders of China, borders fourteen countries by land, the List of countries and territories by land borders, most of any country in the world, tied with Russia. Covering an area of approximately , it is the world's third List of countries and dependencies by area, largest country by total land area. The country consists of 22 provinces of China, provinces, five autonomous regions of China, autonomous regions, four direct-administered municipalities of China, municipalities, and two special administrative regions of China, Special Administrative Regions (Hong Kong and Macau). The national capital is Beijing, and the List of cities in China by population, most populous cit ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Ministry Of State Security (China)
Ministry may refer to: Government * Ministry (collective executive), the complete body of government ministers under the leadership of a prime minister * Ministry (government department), a department of a government Religion * Christian ministry, activity by Christians to spread or express their faith ** Minister (Christianity), clergy authorized by a church or religious organization to perform teaching or rituals ** Ordination, the process by which individuals become clergy * Ministry of Jesus, activities described in the Christian gospels * ''Ministry'' (magazine), a magazine for pastors published by the Seventh-day Adventist Church Music * Ministry (band), an American industrial metal band * Ministry of Sound, a London nightclub and record label Fiction * Ministry (comics), a horror comic book created by writer-artist Lara J. Phillips * Ministry of Magic, governing body in the ''Harry Potter'' series * Ministry of Darkness The Ministry of Darkness was a villain ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  




Vulnerability Database
A vulnerability database (VDB) is a platform aimed at collecting, maintaining, and disseminating information about discovered computer security vulnerabilities. The database will customarily describe the identified vulnerability, assess the potential impact on affected systems, and any workarounds or updates to mitigate the issue. A VDB will assign a unique identifier to each vulnerability cataloged such as a number (e.g. 123456) or alphanumeric designation (e.g. VDB-2020-12345). Information in the database can be made available via web pages, exports, or API. A VDB can provide the information for free, for pay, or a combination thereof. History The first vulnerability database was the "Repaired Security Bugs in Multics", published by February 7, 1973 bJerome H. Saltzer He described the list as "''a list of all known ways in which a user may break down or circumvent the protection mechanisms of Multics''". The list was initially kept somewhat private with the intent of keeping vu ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


People's Republic Of China
China, officially the People's Republic of China (PRC), is a country in East Asia. It is the world's List of countries and dependencies by population, most populous country, with a Population of China, population exceeding 1.4 billion, slightly ahead of India. China spans the equivalent of five time zones and Borders of China, borders fourteen countries by land, the List of countries and territories by land borders, most of any country in the world, tied with Russia. Covering an area of approximately , it is the world's third List of countries and dependencies by area, largest country by total land area. The country consists of 22 provinces of China, provinces, five autonomous regions of China, autonomous regions, four direct-administered municipalities of China, municipalities, and two special administrative regions of China, Special Administrative Regions (Hong Kong and Macau). The national capital is Beijing, and the List of cities in China by population, most populous ci ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


China Information Technology Security Evaluation Center
The China Information Technology Security Evaluation Center (; CNITSEC, ) is the cover identity of the 13th Bureau of the Ministry of State Security, the information technology component of China's civilian spy agency which houses much of its technical cyber expertise. The bureau manages much of the conduct of cyberespionage for the agency, and provides aid to the many advanced persistent threats (APTs) run directly by the agency, by its semi-autonomous provincial State Security Departments (SSD) and municipal State Security Bureaus (SSB), and by contractors. In support of provincial state and party leadership, the bureau also runs its own semi-autonomous provincial Information Technology Security Evaluation Centers (ITSEC) in collaboration with provincial counterparts. In the past these ITSECs have been identified collaborating with APTs run by provincial state security units. The bureau also manages the Chinese National Vulnerability Database (CNNVD), where it has been found ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Vulnerability (computing)
Vulnerabilities are flaws in a computer system that weaken the overall security of the device/system. Vulnerabilities can be weaknesses in either the hardware itself, or the software that runs on the hardware. Vulnerabilities can be exploited by a threat actor, such as an attacker, to cross privilege boundaries (i.e. perform unauthorized actions) within a computer system. To exploit a vulnerability, an attacker must have at least one applicable tool or technique that can connect to a system weakness. In this frame, vulnerabilities are also known as the attack surface. Vulnerability management is a cyclical practice that varies in theory but contains common processes which include: discover all assets, prioritize assets, assess or perform a complete vulnerability scan, report on results, remediate vulnerabilities, verify remediation - repeat. This practice generally refers to software vulnerabilities in computing systems. Agile vulnerability management refers preventing attacks ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Trojan Horse
The Trojan Horse was a wooden horse said to have been used by the Greeks during the Trojan War to enter the city of Troy and win the war. The Trojan Horse is not mentioned in Homer's ''Iliad'', with the poem ending before the war is concluded, and it is only briefly mentioned in the ''Odyssey''. But in the ''Aeneid'' by Virgil, after a fruitless 10-year siege, the Greeks constructed a huge wooden horse at the behest of Odysseus, and hid a select force of men inside, including Odysseus himself. The Greeks pretended to sail away, and the Trojans pulled the horse into their city as a victory trophy. That night, the Greek force crept out of the horse and opened the gates for the rest of the Greek army, which had sailed back under cover of darkness. The Greeks entered and destroyed the city, ending the war. Metaphorically, a "Trojan horse" has come to mean any trick or stratagem that causes a target to invite a foe into a securely protected bastion or place. A malicious computer pr ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Cyberwarfare
Cyberwarfare is the use of cyber attacks against an enemy state, causing comparable harm to actual warfare and/or disrupting vital computer systems. Some intended outcomes could be espionage, sabotage, propaganda, manipulation or economic warfare. There is significant debate among experts regarding the definition of cyberwarfare, and even if such a thing exists. One view is that the term is a misnomer, since no cyber attacks to date could be described as war. An alternative view is that it is a suitable label for cyber attacks which cause physical damage to people and objects in the real world. Many countries including the United States, United Kingdom, Russia, China, Israel, Iran, and North Korea have active cyber capabilities for offensive and defensive operations. As states explore the use of cyber operations and combine capabilities, the likelihood of physical confrontation and violence playing out as a result of, or part of, a cyber operation is increased. However, meet ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Security Vulnerability Databases
Security is protection from, or resilience against, potential harm (or other unwanted coercive change) caused by others, by restraining the freedom of others to act. Beneficiaries (technically referents) of security may be of persons and social groups, objects and institutions, ecosystems or any other entity or phenomenon vulnerable to unwanted change. Security mostly refers to protection from hostile forces, but it has a wide range of other senses: for example, as the absence of harm (e.g. freedom from want); as the presence of an essential good (e.g. food security); as resilience against potential damage or harm (e.g. secure foundations); as secrecy (e.g. a secure telephone line); as containment (e.g. a secure room or cell); and as a state of mind (e.g. emotional security). The term is also used to refer to acts and systems whose purpose may be to provide security (security companies, security forces, security guard, cyber security systems, security cameras, remote guar ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]