diff options
Diffstat (limited to 'content')
-rw-r--r-- | content/docs/architecture_guide/security.md | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/content/docs/architecture_guide/security.md b/content/docs/architecture_guide/security.md index 935301fc7..2dec0765c 100644 --- a/content/docs/architecture_guide/security.md +++ b/content/docs/architecture_guide/security.md @@ -7,7 +7,7 @@ exploitation of kernel bugs when running untrusted code. In order to understand how gVisor achieves this goal, it is first necessary to understand the basic threat model. -## Threats: the Anatomy of an Exploit +## Threats: The Anatomy of an Exploit An exploit takes advantage of a software or hardware bug in order to escalate privileges, gain access to privileged data, or disrupt services. All of the |