1. Identify system weaknesses
The hacker now works at the application layer to find weaknesses in every network service he accesses. Indeed, in most cases, a hacker succeeds in penetrating a system only because of weaknesses that could easily be avoided or corrected, provided the system administrator and the manufacturer of the software he uses pay attention.
The weaknesses are classified into four main groups. Some of these groups – authentication weaknesses 1.2 and configuration weaknesses 1.3...
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!
Identify system weaknesses
Article included in this offer
"Security of information systems"
(
86 articles
)
Updated and enriched with articles validated by our scientific committees
A set of exclusive tools to complement the resources
Bibliography
Requests for Comments (RFC)
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!