Most cyber-attacks happen because vulnerabilities in system or application softw
ID: 3865137 • Letter: M
Question
Most cyber-attacks happen because vulnerabilities in system or application software. Buffer Overflow, SQL Injection, Code/OS Command Injection, Cross-Site Scripting (XSS), Cross-Site Request Forgery and Race Conditions are very common vulnerabilities. (Refer to both NIST/DHS and MITRE databases of common vulnerabilities (http://nvd.nist.gov/cwe.cfm; http://cwe.mitre.org/top25/).) For this conference, explain what a specific vulnerability is, describe a famous attack that leveraged it (For example, the Morris worm leveraged the buffer overflow vulnerability), and how it can be prevented/minimized. Your post can either discuss a vulnerability that has not been discussed, or expand upon what someone has already posted. I encourage multiple postings by an individual.
Explanation / Answer
vulnerability explains the circumstances and characteristics of a system that make it susceptible
to the damaging effects of a hazard.
There are four vulnerability:
1.Physical
2.Social
3.Environmental
4.Economic
steps can be taken to reduce the risk and vulnerability.
Vulnerability assessments allow for the identification of areas of
critical concern and help to mitigate the efforts.
National Oceanic and administration has been developed to mitigate
the risks.
Buffer over flow is a software security vulnerability.
This buffer over flow can attack against newley developed
applications.
Buffer overflow are difficult to discover.
The safety of the code depends on user by entering fewer
than BUFSIZE characters.
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.