WARNING:
JavaScript is turned OFF. None of the links on this concept map will
work until it is reactivated.
If you need help turning JavaScript On, click here.
Cette carte de concepts créée avec IHMC CmapTools traite de: Vulnerabilities, Software due to Poor coding practices, Malicious Code which may be either a Worm, Publicly Available Databases such as NIST's ICAT, Software by far the most prevalent flaw is Buffer Overflow, Publicly Available Databases such as CERT, Vulnerabilities may be the result of older versions of OS or critical components, Software on Hosts, Publicly Available Databases such as Security Focus, Probing Techniques such as Security Scanning Programs, Vulnerabilities may be the result of inadequate password protection, Software due to Inadequate Compiler Checking, Vulnerabilities are catalogued in Publicly Available Databases, Vulnerabilities if discovered may lead to Attack or Exploit, Vulnerabilities are consciously and purposefully exploited by Malicious Code, Software due to Inadequate attention to security, Vulnerabilities exist in Network Infrastructure, Vulnerabilities can be discovered via Probing Techniques, Vulnerabilities may be the result of weak or non existent cryptography, Malicious Code which may be either a Virus, Vulnerabilities exist in Software