Top Banner
security vulnerabilities Ahmed shamel noori
10

Security vulnerability

Jan 08, 2017

Download

Education

A. Shamel
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Security vulnerability

security vulnerabilities

Ahmed shamel noori

Page 2: Security vulnerability

Vulnerability

• A flaw or weakness in system security (procedures, design, implementation, or internal controls) that may result in a security breach or a violation of the system's security policy.

Briefly vulnerability Is a point where a system is

susceptible to attack.

Page 3: Security vulnerability

• Internet technology has been and continues to be vulnerable. There have been reports of all sorts of loop holes, weaknesses, and gaping holes in both software and hardware technologies.

• No one knows how many of these vulnerabilities there are both in software and hardware. The assumption is that there are thousands. As history has shown us, a few are always discovered every day by hackers .

Internet Technology Vulnerability

Page 4: Security vulnerability

• Although the list spans both hardware and software, the problem is more prevalent with software. In fact software vulnerabilities can be put into four categories:

Operating system vulnerabilities .

Port-based vulnerabilities (Enhance system security by blocking those known ports at the firewall).

Application software based errors .

System protocol software such as client and server browser .

Page 5: Security vulnerability

• The most frequently mentioned sources of security vulnerability problems in computer networks are :

• design flaws, • poor security management, • incorrect implementation, • Internet technology vulnerability, • the difficulty of fixing vulnerable systems, • social Engineering

Page 6: Security vulnerability

• Where do vulnerabilities come from?

• Flaws in software .

• Faulty configuration .

• Weak passwords .

• Human error .

Page 7: Security vulnerability

Vulnerabilities in Systems• System vulnerabilities are weaknesses in the software or

hardware on a server or a client that can be exploited by a determined intruder to gain access to or shut down a network.

Page 8: Security vulnerability

• How do viruses, rootkits enter a system?

• Even without the user doing something “stupid” .

• There are vulnerabilities in most software systems .

• Buffer Overflow is the most dangerous and common one .

Page 9: Security vulnerability

If you remember only one thing from this course:

A vulnerability that is will be found “too complicated for

anyone to ever find”!

Page 10: Security vulnerability

Thank you

With best wishes