Chapter 23. Vulnerability Analysis

 

MACBETH: I pull in resolution and beginTo doubt th' equivocation of the fiendThat lies like truth: “Fear not, till Birnam woodDo come to Dunsinane,” and now a woodComes toward Dunsinane. Arm, arm, and out! 

 
 --The Tragedy of Macbeth, V, v, 42–46.

Vulnerabilities arise from computer system design, implementation, maintenance, and operation. This chapter presents a general technique for testing for vulnerabilities in all these areas and discusses several models of vulnerabilities.

Introduction

A “computer system” is more than hardware and software; it includes the policies, procedures, and organization under which that hardware and software is used. Lapses in security can arise from any of these areas or from any ...

Get Computer Security: Art and Science now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.