O'Reilly logo

J2EE™ Security for Servlets, EJBs and Web Services: Applying Theory and Standards to Practice by Pankaj Kumar

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

System Vulnerabilities

Weaknesses in protocols, implementation flaws in software, application design security holes, insecure configurations, and so on. are examples of system vulnerabilities. Let us examine them in some detail.

  • Protocol Weaknesses— As we said earlier, a number of attacks based on weaknesses in IP, ARP, DNS, FTP, and other protocols have been documented. In isolation, they do not appear severe but can be exploited in the presence of other design weaknesses to amplify the security holes.

  • Implementation Flaws— Implementation flaws in widely used network services software such as mail server, ftp server, http server, browsers and utilities such rlogin, rsh, and so on, are very common attack points. A particular kind of flaw known ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required