OVAL
Acronym for Open Vulnerability and Assessment Language. OVAL is an XML-based language that provides a standard for how to check for the presence of vulnerabilities and configuration issues on computer systems. OVAL standardizes the three main steps of the process: collecting system characteristics and configuration information from systems for testing; testing the systems for the presence of specific vulnerabilities, configuration issues, and/or patches; and presenting the results of the tests.
Each OVAL vulnerability definition is based primarily on Common Vulnerabilities and Exposures (CVE), a dictionary-type list of standardized names for vulnerabilities and other information related to security exposures.
Read Also:
- OVF
Short for Open Virtualization Format, OVF is an open and secure platform format for the packaging and distribution of virtual machines. Key features of OVF include optimized distribution for more efficient package transfers, simple installation, supports for both single and multi virtual machine configurations, portable VM packaging, and localization support. The Open Virtualization Format (OVF) […]
- OWASP
Short for Open Web Application Security Project, an open source community project set up to develop software tools and knowledge-based documentation for Web application security. Some of the project��s work includes: A guide to define security requirements to build secure Web applications. Developing an industry standard testing framework for Web application security. VulnXML – A […]
- OWL-S
Short for Ontology Web Language for Services.
- OWL
See Ontology Web Language.
- Object-Based Storage Device
Abbreviated as OSD, an Object-Based Storage Device is a device that implements the standard in which data is organized and accessed as objects, where object means an ordered set of bytes (within the OSD) that is associated with a unique identifier. Objects are allocated and placed on the media by the OSD logical unit. With […]