Vulnerability Impact

  • Race condition – two threads accessing data at the same time
  • End‐of‐life systems – lack of vendor support; no patches
  • Error handling – customer side makes error small; IT support error needs all information
  • Default configuration – changes username or passwords
  • Resource exhaustion – running CPU at 100% or running out of memory
  • Untrained users – not complying with policies
  • Key management – ensures keys signed in and out each day
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset