1. Web Insecurity Contributing Factors
A Typical Morning
“Morning, Ryan. Hey, it looks like it was a pretty quiet night, as I didn’t receive any pager alerts. After looking at some of the IDS logs, it is all normal script kiddie probes and such.”
“Good, let’s hope it stays that way,” I said as I laid down my laptop bag in my cubicle. I slid into my chair, locked the keyboard tray into position, and gazed up at the computer monitor as it began to glow to life. It was now time for my morning ritual, so I turned on some Radiohead, took a sip of my coffee, and began to read my email.
As my eyes quickly glanced down the multitude of emails, one subject line in particular caught my eye—Multiple Oracle vulnerabilities discovered. This ...