Computer Vulnerabilities phần 3

Phần mềm máy tính và phần cứng theo thời gian nghiên cứu rất tốt và đã có thời gian để có vấn đề phát hiện ra có thể gây phương hại đến an ninh. Mặc dù nó không đảm bảo một break-in, linh kiện máy tính cũ có xu hướng trở nên dễ bị lỗ hổng bảo mật hiện đại. | Computer Vulnerabilities Computer Weakness Page 21 Aged Software and Hardware Computer software and hardware over time become very well studied and have had time to have problems discovered which may be detrimental to security. Although it doesn t guarantee a break-in older computer components have a tendency to become susceptible to modern vulnerabilities. This problem can be combated by upgrading components but is a flaw inherent in any unit. My experience with operating systems has shown they develop its first publicly known vulnerability within a month from being released to the public. The operating systems that have the closest scrutiny Windows NT Solaris HP-UX Irix and Linux have generated between 15 and 50 vulnerabilities per year for each of them between 1995 and 1998 People Computer security can t live with them and can t live without them. Simply put it is best to have a security policy in place at a company and make sure that employees must abide by them. There are so many things that can go wrong in this area alone The more people on any given host will definitely weaken its security in general People demand convenience which often conflicts with security interests People can be coaxed out of important information by Social Engineering Failure to properly protect their passwords Failure to properly protect access to their computer console Sabotage Corruption It is the duty of the person administrating computer security to protect against these problems they are the ones educated enough to understand what may happen. Yes I have seen people put posted guards at computers with firearms. People have actually put guards on automated telephone equipment to prevent abuse. No I couldn t figure out exactly how they were protecting it. Likewise I don t think they knew what they were protecting it from. Computer Vulnerabilities Policy Oversights Page 22 Policy Oversights When a situation occurs that has not been planned for such as an intrusion into a computer .

Không thể tạo bản xem trước, hãy bấm tải xuống
TỪ KHÓA LIÊN QUAN
TÀI LIỆU MỚI ĐĂNG
242    132    1    05-07-2024
2    1439    2    05-07-2024
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.