summaryrefslogtreecommitdiffhomepage
diff options
context:
space:
mode:
-rw-r--r--content/docs/architecture_guide/security.md2
1 files changed, 1 insertions, 1 deletions
diff --git a/content/docs/architecture_guide/security.md b/content/docs/architecture_guide/security.md
index 935301fc7..2dec0765c 100644
--- a/content/docs/architecture_guide/security.md
+++ b/content/docs/architecture_guide/security.md
@@ -7,7 +7,7 @@ exploitation of kernel bugs when running untrusted code. In order to understand
how gVisor achieves this goal, it is first necessary to understand the basic
threat model.
-## Threats: the Anatomy of an Exploit
+## Threats: The Anatomy of an Exploit
An exploit takes advantage of a software or hardware bug in order to escalate
privileges, gain access to privileged data, or disrupt services. All of the