17.3 – Vulnerability Prevention

17.3 – Vulnerability Prevention
In this section, we’ll look at the top five common vulnerability prevention techniques, and provide tips on how an enterprise can fix such issues, and combat attacks that try to exploit it. Authentication and access control: One of the greatest areas of concern is that usually passwords are shared among websites through a single set of credentials used to access a corporate email, and other sites like eBay and PayPal. For example, say a social networking site used by many users is attacked, and immediately after running a shell code, all emails, usernames and passwords are accessed remotely by the hacker.…
To access this content, you must subscribe to this Consolidated Tekedia Subscription, or log in if you are a member.

Share this post