官术网_书友最值得收藏!

Security and threats

In a growing connected world, security threats are constantly evolving to find new ways to steal or damage data. For any organization and any inpidual who has an internet enabled system, it becomes very important to protect that information. Malicious or ignorant human activity are major threats to computers. Malicious action always has a goal to achieve and a specific target to be attacked.

Attackers generally have motives or goals. These motives and goals usually abide by the following formula:

Motive + Method + Vulnerabilities = Attack:

As the following diagram shows, security threats are driven either by humans or natural disasters. Threats driven by humans can be further categorized into external or internal threats, or can be put down to user ignorance. We will discuss each of these in detail:

Security vulnerabilities

A malicious attacker uses a method to find the resources of a target, finds known vulnerabilities of targeted resources, and then exploits vulnerabilities in order to achieve a goal. Vulnerabilities are weaknesses, misconfigurations or loopholes in security that an attacker exploits in order to gain access to the network or resources on the network.

Security vulnerabilities are not limited to web, SQL DB, or operating systems. The same approach goes for any infrastructure networking gears.

These are the three main categories:

  • Technology weaknesses
  • Configuration weaknesses
  • Security policy weaknesses
主站蜘蛛池模板: 米泉市| 疏附县| 清水县| 武功县| 凤台县| 犍为县| 碌曲县| 突泉县| 内乡县| 思茅市| 黎平县| 宣汉县| 绵阳市| 广饶县| 武宁县| 双流县| 林西县| 多伦县| 紫云| 安顺市| 溆浦县| 呼和浩特市| 法库县| 宽城| 洛川县| 卢氏县| 通榆县| 洛隆县| 梓潼县| 察哈| 淮阳县| 临清市| 巨鹿县| 敦煌市| 石狮市| 德钦县| 鞍山市| 蒙山县| 观塘区| 嘉善县| 达州市|