security vulnerability

10
security vulnerabilities Ahmed shamel noori

Upload: a-shamel

Post on 08-Jan-2017

29 views

Category:

Education


0 download

TRANSCRIPT

Page 1: Security vulnerability

security vulnerabilities

Ahmed shamel noori

Page 2: Security vulnerability

Vulnerability

• A flaw or weakness in system security (procedures, design, implementation, or internal controls) that may result in a security breach or a violation of the system's security policy.

Briefly vulnerability Is a point where a system is

susceptible to attack.

Page 3: Security vulnerability

• Internet technology has been and continues to be vulnerable. There have been reports of all sorts of loop holes, weaknesses, and gaping holes in both software and hardware technologies.

• No one knows how many of these vulnerabilities there are both in software and hardware. The assumption is that there are thousands. As history has shown us, a few are always discovered every day by hackers .

Internet Technology Vulnerability

Page 4: Security vulnerability

• Although the list spans both hardware and software, the problem is more prevalent with software. In fact software vulnerabilities can be put into four categories:

Operating system vulnerabilities .

Port-based vulnerabilities (Enhance system security by blocking those known ports at the firewall).

Application software based errors .

System protocol software such as client and server browser .

Page 5: Security vulnerability

• The most frequently mentioned sources of security vulnerability problems in computer networks are :

• design flaws, • poor security management, • incorrect implementation, • Internet technology vulnerability, • the difficulty of fixing vulnerable systems, • social Engineering

Page 6: Security vulnerability

• Where do vulnerabilities come from?

• Flaws in software .

• Faulty configuration .

• Weak passwords .

• Human error .

Page 7: Security vulnerability

Vulnerabilities in Systems• System vulnerabilities are weaknesses in the software or

hardware on a server or a client that can be exploited by a determined intruder to gain access to or shut down a network.

Page 8: Security vulnerability

• How do viruses, rootkits enter a system?

• Even without the user doing something “stupid” .

• There are vulnerabilities in most software systems .

• Buffer Overflow is the most dangerous and common one .

Page 9: Security vulnerability

If you remember only one thing from this course:

A vulnerability that is will be found “too complicated for

anyone to ever find”!

Page 10: Security vulnerability

Thank you

With best wishes