WARNING:
JavaScript is turned OFF. None of the links on this concept map will
work until it is reactivated.
If you need help turning JavaScript On, click here.
Cette carte de concepts créée avec IHMC CmapTools traite de: Vulnerabilities, Vulnerabilities are catalogued in Publicly Available Databases, Software due to Inadequate Compiler Checking, Software due to Inadequate attention to security, Software on Hosts, Software due to Poor coding practices, Publicly Available Databases such as CERT, Publicly Available Databases such as NIST's ICAT, Vulnerabilities may be the result of older versions of OS or critical components, Vulnerabilities if discovered may lead to Attack or Exploit, Probing Techniques such as Security Scanning Programs, Software by far the most prevalent flaw is Buffer Overflow, Vulnerabilities exist in Software, Publicly Available Databases such as Security Focus, Vulnerabilities exist in Network Infrastructure, Malicious Code which may be either a Trojan Horse, Vulnerabilities may be the result of weak or non existent cryptography, Vulnerabilities may be the result of inadequate password protection, Malicious Code which may be either a Virus, Malicious Code which may be either a Worm, Vulnerabilities can be discovered via Probing Techniques