Computer Attacks. Security weaknesses that are commonly exploited
A computer attack is to exploit any weakness or failure (vulnerability) exists in a program (operating systems and applications on this) in the physical components that make up the information environment, and even in people who use these resources.
The aim is, somehow, get information that can then be used for fraudulent purposes to benefit themselves from the offender. In general the benefit sought is economic in nature, causing a negative effect on the safety critical system, which then directly affects the organization's assets and result in loss of money.
This document provides a quick overview on these weaknesses, combined with possible countermeasures under which you may invoke to prevent effectively the different types of attacks that a system receives daily.
The aim is, somehow, get information that can then be used for fraudulent purposes to benefit themselves from the offender. In general the benefit sought is economic in nature, causing a negative effect on the safety critical system, which then directly affects the organization's assets and result in loss of money.
This document provides a quick overview on these weaknesses, combined with possible countermeasures under which you may invoke to prevent effectively the different types of attacks that a system receives daily.
English version | Spanish version
More White papers in MalwareIntelligence web site.
0 comentarios:
Post a Comment