WARNING:
JavaScript is turned OFF. None of the links on this concept map will
work until it is reactivated.
If you need help turning JavaScript On, click here.
Cette carte de concepts créée avec IHMC CmapTools traite de: Server Processes, Software Upgrades must comply with Customized Configurations, Vulnerabilities can be caused by Unknown Security Flaws, Well known security flaws reported by Security Bulletins, Lower Ports ( < 1024) divided into Higher Ports (>= 1024), Well Known Ports usually identify Daemons, Config files by Administrators, Vulnerabilities can result in DOS attacks, Unknown Security Flaws identified by Intrusion Detection, Server Processes also known as Daemons, Config files by Scripts or cron jobs, Daemons e.g. Telnet Daemon, Unknown Security Flaws identified by Traffic Analysis, Interfaces by Scripts or cron jobs, Software Upgrades must comply with Customized Add-ons, Server Processes are maintained through Config files, identity hijacking of Connections, Server Processes may introduce Vulnerabilities, Vulnerabilities can be caused by Well known security flaws, Server Processes use Software Ports, Vulnerabilities can be caused by Deprecated Software Version