O'Reilly logo

Hacking Exposed 7: Network Security Secrets & Solutions by George Kurtz, Joel Scambray, Stuart McClure

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

APPENDIX BTOP 10 SECURITY VULNERABILITIES

1. Weak Passwords Weak, easily guessed, and reused passwords can doom your security. Test accounts have poor passwords and little monitoring. Do not reuse passwords across your systems or Internet sites.

2. Unpatched Software Software that is unpatched, outdated, vulnerable, or left in the default configurations. Most breaches can be avoided by rolling patches as soon as practical and tested.

3. Unsecured Remote Access Points Unsecured and unmonitored remote access points provide one of the easiest means of access to your corporate network. One of the greatest pain points are former employee accounts that have not been disabled.

4. Information Leakage Information leakage can provide the attacker with ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required