百家乐怎么玩-澳门百家乐官网娱乐城网址_网上百家乐是不是真的_全讯网888 (中国)·官方网站

III. Vulnerabilities of Hacking Protection

by JUCC ISTF
/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */  
 
 
Common Types of Attack
 

Vulnerability scanning

Hacker may initiate vulnerability scanning on target organisation's network to proactively identify the vulnerabilities of computer systems on a network. Hacker may obtain the operating system and version number, including service packs that may be installed, and identifies weaknesses or vulnerabilities in the operating system, on which certain hacking protection technologies are deployed.

Password cracking

Hacker may attempt to get password of an authorised user to gain access to the system with the username and password with authentication, which may render the hacking protections ineffective.

Trojans and backdoors

Trojans may sometimes be hidden in a software package of another program. Victims download the software package and install trojans onto their computer without notice. Once installed, trojans can run malicious programs on victim's computer, such as running commands remotely, intercepting keystrokes and so on. Backdoors created by Trojans also give hackers subsequent access to victims' computers.

Viruses and worms
The malicious codes from the hacker can be spread to victim's computer by a carrier programs, either via the form of viruses or worms. A virus code is infected on another normal program to spread itself. A worm is able to self-replicate and move from an infected computer to another victim's computer through network connection. If the hacking protection mechanisms are infected by viruses and worms, their abilities to defend against malicious attacks can be seriously impaired.

Recent Incident

HKEx Website Hacked

Trading in Hong Kong was disrupted on 10 August 2011 by a hacking incident on the Hong Kong Exchange website.

Shares of eight-listed companies were suspended from trade, including those of bourse operator Hong Kong Exchanges and Clearing, flag-carrier Cathay Pacific and banking giant HSBC.

Hong Kong Exchanges & Clearing CEO Charles Li said: "Our current assessment (is) that this is the result of a malicious attack by outside hacking.

Denial of Service
Denial of service (DoS) is initiated by hackers to prevent legitimate users of a system from using it by different methods, such as flooding a network with traffic and preventing a particular individual from accessing a service. If a denial of service attack is posed upon an intrusion detection system, it is possible that the intrusion detection system is suspended and further exploitations can be generated gainst the Universities' network.

Inadequate Code Review
Inadequate Code Reviews performed for application can result in system vulnerabilities and allow various malicious attack attempts successfully made by hackers.

Buffer overflow -- Hacker may send exceeding amount of information to a field variable in an application in order to cause an application error. The improper error handling of the application as the result of in adequate code reviews may lead to the execution of malicious commands after buffer overflow attack.

SQL injection -- SQL injection is dangerous to any database server behind a web application if there are insufficient input validation mechanisms in place. Hacker may be able to dump, alter, delete or create information in a database by inserting deliberated SQL commands into the input.

Cross-site scripting -- Web forms in the web pages of a web application may have a higher risk of being exploited by cross-site scripting (XSS) threat if malicious command entered into the web form is processed by the web application without being detected by its security function.

Relevant Material

Open Source Vulnerability Database (OSVDB)

Founded in August 2002 at the Black Hat and Defcon conferences, OSVDB was created to provide an independent and Open Source Vulnerability Database. The goal was to provide accurate, detailed, current and unbiased technical information about all types of vulnerabilities.

The project will promote greater, more open collaboration between companies and individuals, eliminate redundant works, and reduce expenses inherent with the development and maintenance of in-house vulnerability databases

See the article: (http://osvdb.org)

Reference:
http://www.eccouncil.org/CEH.htm

 

[Previous section][Next section]

 

 

 

赢家百家乐的玩法技巧和规则| 虎在什么方位做生意好| 威尼斯人娱乐城信誉怎么样| 大发888开户日博备用| 海林市| 三国百家乐官网的玩法技巧和规则| 利都百家乐国际娱乐场| 绥江县| 百家乐高人玩法| 真人游戏俱乐部| 豪博百家乐官网娱乐城| 百家乐api| 百家乐官网投注办法| 24个招财方法| 宝胜网| 百家乐怎么会赢| 利记线上娱乐| 电子百家乐官网打法| 大发888娱乐场 注册| 宿迁市| 百家乐庄闲和各是多少| 新世纪娱乐城信誉怎么样| 百家乐手机软件| 皇冠网址推介| 求购百家乐官网程序| 百家乐游戏群号| 桐柏县| 电子百家乐破| 新加坡百家乐官网的玩法技巧和规则 | 如何胜百家乐的玩法技巧和规则 | 大发888 博彩| 风水97年农历6月24八字| 白金娱乐城| 在线百家乐纸牌| E世博百家乐官网娱乐城| 瑞丰国际娱乐场| 正规百家乐平注法口诀| 蓝盾百家乐官网庄家利润分| 乐众国际娱乐| 大赢家百家乐娱乐| 鼎龙百家乐官网的玩法技巧和规则 |