preview

Vulnerabilities Are Known As Security Holes That Exist

Decent Essays

Vulnerabilities- Vulnerabilities are known as security holes that exist in software, buffer flow is one example which happens when the developer of a software product expects a certain amount of data, for example 20 bytes of information, to be sent at a particular point in the operation of an agenda, but fails to allow for an error circumstances where the user (or malicious attacker) sends a great deal more data, or unexpected (perhaps special) characters. Vulnerabilities occurs in software running on PC’s, servers, communications equipment such as routers, or almost any device running software. Not all vulnerabilities are created equal- some will cause the program affected to crash (which can lead to a denial of service condition on the …show more content…

These viruses contain their own e-mail server, so that they can replicate by sending email to all mail addresses that they harvest from the system. Worms- An example of a worm is the Blaster worm, which rapidly spread through the Internet in August 2003. Blaster targeted computers running Windows operating systems, and used a vulnerability in Remote Procedure Call (RPC) code. Blaster affected computers running Windows 2003 operating system, Windows NT 4.0, Windows NT 4.0 Terminal Services Edition, Windows 2000, and Windows XP. After compromising hundreds of thousands of systems, Blaster launched a distributed denial of service attack on a Microsoft Windows update site. Trojan horses- As the name implies, these are software programs that are put onto target systems (whether by a direct hack, or as the result of a virus or worm) that have a malicious intent. The Trojan can capture passwords, or provide root access to the system remotely.
Denial of service attacks (DoS)- A denial of service attack attempts to put the condition will often times try to compromise many PC’s, and use them to “amplify” the attack volume, and to hide his or her tracks as well. This is called a Distributed Denial of Service Attack (DDoS). Denial of service attacks have now become a well-known criminal activity. In an online form of the “protection racket” (pay us some protection money or we’ll ruin your business), computer criminals have taken to

Get Access