Chapter 20. Vulnerability Analysis

 

MACBETH: I pull in resolution and begin To doubt th' equivocation of the fiend That lies like truth: “Fear not, till Birnam wood Do come to Dunsinane,” and now a wood Comes toward Dunsinane. Arm, arm, and out!

 
 --The Tragedy of Macbeth, V, v, 42–46.

Vulnerabilities arise from computer system design, implementation, maintenance, and operation. This chapter presents a general technique for testing for vulnerabilities in all these areas and discusses several models of vulnerabilities.

Introduction

A “computer system” is more than hardware and software; it includes the policies, procedures, and organization under which that hardware and software is used. Lapses in security can arise from any of these areas or from ...

Get Introduction to Computer Security now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.