• Vulnerability
  • The threats to our products April 1, 1999 By Loren Kohnfelder and Praerit Garg




    Download 58.92 Kb.
    bet2/15
    Sana30.03.2021
    Hajmi58.92 Kb.
    #13786
    1   2   3   4   5   6   7   8   9   ...   15
    Server operating systems   Windows NT/2000 Server

  • Client operating systems   Windows NT/2000 Workstation, Win9x, WinCE, Internet Explorer

  • Client/server applications   Exchange, SQL, etc.

  • Desktop applications   Office, etc.

  • Web and media applications   WebEssentials, portal Web sites, etc.

    But first, let's define some important terms that we'll use throughout this piece and that have very precise meaning in security discussions.

    • Threat   Any potential occurrence, malicious or otherwise, that can have an undesirable effect on the system resources (files, registry keys, data-on-wire, etc.). Undesirable effects can be a system crash, the ability to read a sensitive file or modify a registry key, and so forth.

    • Vulnerability   Some unfortunate characteristic that makes it possible for a threat to occur. Examples include bad security on a file, buffer overflows, and (in a server product running on Windows NT) missing client impersonation calls when servicing client requests.

    • Attack   An action taken by a malicious intruder to exploit certain vulnerabilities to enact the threat. Examples of attacks include steps taken by a non-administrator to acquire administrator privileges and a technique that allows private data to be leaked.

    Three aspects of system security





    Download 58.92 Kb.
  • 1   2   3   4   5   6   7   8   9   ...   15




    Download 58.92 Kb.

    Bosh sahifa
    Aloqalar

        Bosh sahifa



    The threats to our products April 1, 1999 By Loren Kohnfelder and Praerit Garg

    Download 58.92 Kb.