O'Reilly logo

Computer Incident Response and Product Security by Damir Rajnović

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 10. Actors in Vulnerability Handling

Vulnerability handling and managing is not something done solely by vendors. It involves multiple other actors, and each of them has a specific role in the overall process. The roles of individual players and interactions among them is changing and evolving over time.

This chapter investigates who the players in the vulnerability handling process are, what their roles are, how they interact with each other, and the current trends in how these relationships are changing. The main actors are

Researches

Vendors

Coordinators

Users

Researchers

Researchers” is a catch-all word that encompasses all classes of people who are scrutinizing products for security vulnerabilities. Researchers can range ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required