WARNING:
JavaScript is turned OFF. None of the links on this concept map will
work until it is reactivated.
If you need help turning JavaScript On, click here.
Cette carte de concepts créée avec IHMC CmapTools traite de: Hosts, Vulnerabilities may exist at either OS level, Loss of Data, Server Processes typically listen on specific ports, servers listen for a variety of incoming connections, Hosts are typically either servers, Application level include User-level Programs, workstations listen for a few incoming connections, Authorized Human User utilizes interactively and directly workstations, User-level Programs such as Word Processor, incoming connections in order to provide services via the network, Hosts are typically either workstations, Hosts are usually connected to Network, Vulnerabilities if discovered may result in Exploit or Attack, Exploit or Attack may lead to Loss, Hosts will almost always have some Vulnerabilities, Authorized Human User utilizes indirectly servers, Application level include Server Processes, specific ports which is commonly identified with a single services via the network, User-level Programs such as FTP Clients, Exploit or Attack may be initiated remotely (Internet)