- AWS Certified Advanced Networking:Specialty Exam Guide
- Marko Sluga
- 133字
- 2021-06-24 14:14:52
Exploiting vulnerabilities
There are several types of vulnerability attacks that can be executed over the network:
- Exploiting a vulnerability: An attacker exploits a known vulnerability of an unpatched system for DoS or to gain access
- Zero-day attacks: An attacker exploits a newly released vulnerability of the system for DoS or to gain access before the vendor provides a patch
- Unknown vulnerability: An attacker exploits a known vulnerability of the system for DoS or to gain access
Protecting from vulnerabilities is a complicated matter as it requires tight coordination between the network, security, and the operations team to detect, identify, and prevent vulnerability attacks from being carried out. However, AWS WAF offers features that help prevent the exploitation of the most important security flaws, as named by the Open Web Application Security Project (OWASP).
推薦閱讀
- 機(jī)器學(xué)習(xí)及應(yīng)用(在線實(shí)驗(yàn)+在線自測(cè))
- 輕松學(xué)C#
- PyTorch深度學(xué)習(xí)實(shí)戰(zhàn)
- 機(jī)艙監(jiān)測(cè)與主機(jī)遙控
- MicroPython Projects
- 西門子S7-200 SMART PLC實(shí)例指導(dǎo)學(xué)與用
- 新手學(xué)電腦快速入門
- OpenStack Cloud Computing Cookbook
- 傳感器與新聞
- HTML5 Canvas Cookbook
- 電腦上網(wǎng)輕松入門
- 基于神經(jīng)網(wǎng)絡(luò)的監(jiān)督和半監(jiān)督學(xué)習(xí)方法與遙感圖像智能解譯
- HBase Essentials
- 21天學(xué)通Linux嵌入式開發(fā)
- MPC5554/5553微處理器揭秘