Most security threats are made by attackers using a relatively small number of vulnerabilities. Attackers, being relatively opportunistic, take the path of least resistance, and continue to take advantage of these most common failures, rather than seeking out new exploits or taking advantage of more difficult ones. Fortunately, in many cases, their predictability makes it easier to prevent attack by following a few simple rules:
- Apply regular updates and patches as they become available.
- Employ security software and hardware such as firewalls and authentication servers.
- Do not use default passwords and other values that are provided with your software.
The top three threats are:
- Web servers and services. Default HTTP (Web) servers have had several vulnerabilities, and numerous patches have been issued over the past several years. Make sure all your patches are up to date, and do not use default configurations or default demonstration applications. These vulnerabilities may lead to denial-of-service attacks and other types of threats.
- Workstation service. An attacker can obtain full control over a computer by compromising the Windows Workstation service, which is normally used to route user requests.
- Windows remote access services. A variety of remote access methods are included by default on most systems. These systems can be very useful, but also very dangerous, and an attacker with the right tools can easily gain control over a host.
Cyber attacks fall under several general categories:
(1) accidental actions and
I. Accidental Actions
Accidental actions contribute to a large number of computer security risks. This
II. Malicious Attacks
Attacks that specifically aim to do harm are known as premeditated or malicious
III. Online Fraud
Online fraud is a broad term covering Internet transactions that involve falsified
and charity facades, where donations are solicited for phony causes.
Identity theft is a major form of online fraud, or misrepresentation. Personal
Data theft is the term used to describe not only the theft of information but also



No comments:
Post a Comment