preview

The Flaw Of A Computer Environment

Decent Essays

One of the most common flaws in a computer environment is that of password strength. This can be controlled through a minimum strength requirement as discussed later with the use of Active Directory (see: Additional – Network). In computer terms, password strength is evaluated as bits. As a general rule, the more bits a password contains, the longer it would take to break (Profis, 2012). According to the MSDN, the “… use of strong passwords can slow or defeat the various attack methods of compromising a [computer’s] security” (Microsoft Developer Network, 2006). Password Storage Another important issue that was identified during the investigation of the virtual machine was that of storage of passwords in plain-text documents. The “green” …show more content…

They found that through the modification of a previously expired password, the attempts made to access the account needed are significantly lower as opposed to a new password (for example, using “password”, and then using “pa$sword”) (Zhang, Monrose, & Reiter, 2010). Software Adobe Reader 6.0 Adobe Reader is a software package that allows users to open and access PDF (portable document format) documents. The aforementioned version was released during July 2003. The particular issues pertaining to this version of Adobe were identified in the CVE (see: glossary) and each scored 9.3 on the CVSS (see: glossary). The vulnerabilities identified include the ability for “…remote attackers to execute arbitrary code via a crafted PDF” which then results in memory corruption, execution code overflows and the ability to execute a DoS attack (Adobe, 2007). mIRC 6.0 The CVE database accessed through the CVE Details page gives access to the mIRC CVE’s, and the associated CVSS’s. There are only two available, scoring moderately high (5.0 and 7.5). The two vulnerabilities identified are an Exec Code Overflow which allows attackers to execute code as previously mentioned with the Adobe software, and also there is a vulnerability which gives access to personal information. However, there was another vulnerability found, a buffer

Get Access