preview

David Vs Goliath

Decent Essays
What are the natural advantages of a ‘David’ in these situations, vs. those of a ‘Goliath’?
Most ‘Goliath’ firms have disparate legacy systems, applications, processes and data sources. These legacy systems may have vulnerabilities such as unpatched software, default passwords, application vulnerabilities like SQL injection, buffer overflows, insecure frameworks and libraries, outdated security mechanisms etc. Unfortunately such vulnerabilities are not just limited to desktops and laptops, hidden legacy systems are also hidden inside network devices (routers, modems etc.), printers and scanners. The highest risk situation arises when the oldest technology is suddenly exposed to the latest, most cutting-edge channels. Legacy systems are also
Get Access