
Security vulnerabilities
-
This study delves into the security vulnerabilities of blockchain consensus mechanisms and the source code, providing insights into the cybersecurity challenges facing the DeFi sector.
7p
visarada
28-04-2025
0
0
Download
-
Recent attacks, infections, and malicious code are mostly exploited by hackers as a potential vulnerability on unsecured user computers. The issue for administrators is how to protect hundreds of computers within the organization from such insecurity.
6p
tuetuebinhan000
23-01-2025
3
2
Download
-
Chapter 6 - Email and web security. The main contents of this chapter include all of the following: Protect e-mail systems, list World Wide Web vulnerabilities, secure web communications, secure instant messaging.
48p
nhanmotchut_3
20-10-2016
57
4
Download
-
Chapter 10 - Public key infrastructure. After completing this chapter, students will be able to: Explain cryptography strengths and vulnerabilities, define public key infrastructure (PKI), manage digital certificates, explore key management.
34p
nhanmotchut_3
20-10-2016
40
4
Download
-
Lecture "On safety and security of information systems: Introduction to information systems security" provide students with knowledge about: History of information security; Information systems security; Risks, threats, and vulnerabilities;... Please refer to the detailed content of the lecture!
59p
hoabingan205
12-12-2022
19
5
Download
-
Used to connect two private networks together via the Internet Used to connect remote users to a private network via the Internet This could be done by opening your firewall to the LAN networking protocols (NETBIOS, NFS NetWare, AppleTalk)) But… it would also make those protocols available to any one on the Internet and they could come into your LAN at will Effectively make the whole Internet your LAN Exposes all of your data Anyone can easily take advantage of vulnerabilities in your internal hosts No privacy Better solution is to use a VPN in conjunction with your firewall ...
18p
muathu_102
28-01-2013
86
4
Download
-
You don’t have to know all of the details You do need to know your system What services it is providing What protocols are involved What vulnerabilities is has How to minimize the risks
18p
muathu_102
28-01-2013
43
2
Download
-
IP Address Scans scan the range of addresses looking for hosts (ping scan) Port Scans scan promising ports for openness (80, 21, …) Service Evaluation determine the OS Target Selection pick the most vulnerable host, most running services... Vulnerability Probes Automated password attacks FTP, HTTP, NetBIOS, VNC PCAnywhere…. Application specific attacks try known vulnerabilities on present services
9p
muathu_102
28-01-2013
74
4
Download
-
Web now widely used by business, government, individuals but Internet & Web are vulnerable have a variety of threats integrity confidentiality denial of service authentication need added security mechanisms
14p
doilan
26-01-2013
56
4
Download
-
Summary A security vulnerability exists in the Messenger Service that could allow arbitrary code execution on an affected system. The vulnerability results because the Messenger Service does not properly validate the length of a message before passing it to the allocated buffer.
6p
vn9h_vnc
26-04-2011
79
5
Download
-
A security vulnerability exists in the Messenger Service that could allow arbitrary code execution on an affected system. The vulnerability results because the Messenger Service does not properly validate the length of a message before passing it to the allocated buffer.
6p
ad_uit
09-01-2011
73
4
Download
-
An toàn (Security) là giảm thiểu các điểm yếu dễ bị tấn công đối với các tài sản và tài nguyên. Một tài sản được định nghĩa là bất cứ thứ gì có giá trị. Điểm yếu dễ bị tấn công (Vulnerability) là bất kỳ điểm yếu nào, sao cho thông qua nó có thể khai thác hệ thống hoặc thông tin có trong hệ thống đó. Một hiểm hoạ (threat) là một xâm phạm an toàn tiềm ẩn.
9p
anhnghi1202
12-06-2010
266
84
Download
CHỦ ĐỀ BẠN MUỐN TÌM
