官术网_书友最值得收藏!

The threat landscape

If you've kept up with IT technology news over the past few years, you'll likely have seen at least a few articles about how attackers have compromised Linux servers.  For example, while it's true that Linux isn't really susceptible to virus infections, there have been several cases where attackers have planted other types of malware on Linux servers.  These cases have included:

  • Botnet malware: It causes a server to join a botnet that is controlled by a remote attacker. One of the more famous cases involved joining Linux servers to a botnet that launched denial-of-service attacks against other networks.
  • Ransomware: It is designed to encrypt user data until the server owner pays a ransom fee. But, even after paying the fee, there's no guarantee that the data can be recovered.
  • Cryptocoin mining software: It causes the CPUs of the server on which it's planted to work extra hard and consume more energy. Cryptocoins that get mined go to the accounts of the attackers who planted the software.

And, of course, there have been plenty of breaches that don't involve malware, such as where attackers have found a way to steal user credentials, credit card data, or other sensitive information.

Some security breaches come about because of plain carelessness. Here's an example of where a careless Adobe administrator placed the company's private security key on a public security blog: https://www.theinquirer.net/inquirer/news/3018010/adobe-stupidly-posts-private-pgp-key-on-its-security-blog.

主站蜘蛛池模板: 德令哈市| 阜南县| 常宁市| 常熟市| 瓦房店市| 乐清市| 阜新市| 康马县| 咸宁市| 桐城市| 长子县| 会宁县| 屯留县| 博乐市| 双牌县| 龙泉市| 泉州市| 胶南市| 平潭县| 高安市| 新绛县| 宣汉县| 左云县| 庆阳市| 得荣县| 新余市| 徐汇区| 北川| 东港市| 舟山市| 兰西县| 和政县| 清涧县| 琼中| 大理市| 同仁县| 五华县| 旺苍县| 十堰市| 绥滨县| 合水县|