Vulnerabilities

A vulnerability on a SOHO computer is essentially a weakness that may be open to an attack by some evil-doer. However, not all vulnerabilities are hardware-related, many are software bugs or a gap in a process or procedure, or the unsecured storage of controlled documents, like blank checks. Some vulnerabilities can be remedied or mitigated through applying software updates and patches. Some are known only to an attacker (zero day vulnerabilities). Others may need some physically applied solution. Figure 2-2 shows the landing page for the CISA’s “Known Exploited Vulnerabilities Catalog” website. This organization maintains a list of the vulnerabilities being exploited in the US and around the world. Regardless of the nature of ...

Get Internet and Web Application Security, 3rd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.