O'Reilly logo

Solaris 8 Security by Edgar Danielyan

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Design Vulnerabilities

There are two types of vulnerabilities, and one of them is design vulnerability. Design vulnerability exists when a particular system, software, or protocol is designed without keeping in mind security considerations and without embedding security into the design specification. Examples of design vulnerabilities are the telnet, File Transfer Protocol (FTP), and Remote Login (RLOGIN) protocols. They do not address such issues as connection eavesdropping, connection hijacking, Domain Name System (DNS) spoofing, and impersonation, among others. (It’s not that these were real problems at the time these protocols were designed. But never mind. There are no excuses in security.)

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required