Vulnerabilities and Exploits

Unfortunately for security-minded small to large businesses, software developers create applications and protocols in which security is a secondary consideration, if at all. Adding to a potential problem, network and system hardware and much of its software are vulnerable through its design or its misconfiguration. Hardware and software that are not carefully managed are typically easy targets for exploitation. And, on any system, network users present vulnerabilities, threats and risk.

In defense of systems and networks, administrators and users should be made aware of:

  • Software vulnerabilities—Many software packages, including applications, operating systems and other system software, have inherent vulnerabilities ...

Get Internet and Web Application Security, 3rd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.