WARNING:
JavaScript is turned OFF. None of the links on this concept map will
work until it is reactivated.
If you need help turning JavaScript On, click here.
Cette carte de concepts créée avec IHMC CmapTools traite de: Server Processes, Server Processes may introduce Vulnerabilities, Well known security flaws reported by Software Vendor, Config files by Scripts or cron jobs, Lower Ports ( < 1024) divided into Higher Ports (>= 1024), Server Processes also known as Daemons, Vulnerabilities can be caused by Deprecated Software Version, identity hijacking of Connections, Software Upgrades must comply with Customized Add-ons, Software Ports identified by numbers, Config files by Administrators, Vulnerabilities can be caused by Unknown Security Flaws, Software Upgrades must comply with Customized Configurations, Server Processes are maintained through Config files, Well Known Ports usually identify Daemons, Deprecated Software Version require Software Upgrades, Server Processes use Software Ports, Daemons e.g. FTP Daemon, Unknown Security Flaws identified by Traffic Analysis, Daemons e.g. Telnet Daemon, numbers range from 1 to 65535