官术网_书友最值得收藏!

Exploiting vulnerabilities

There are several types of vulnerability attacks that can be executed over the network:

  • Exploiting a vulnerability: An attacker exploits a known vulnerability of an unpatched system for DoS or to gain access
  • Zero-day attacks: An attacker exploits a newly released vulnerability of the system for DoS or to gain access before the vendor provides a patch
  • Unknown vulnerability: An attacker exploits a known vulnerability of the system for DoS or to gain access

Protecting from vulnerabilities is a complicated matter as it requires tight coordination between the network, security, and the operations team to detect, identify, and prevent vulnerability attacks from being carried out. However, AWS WAF offers features that help prevent the exploitation of the most important security flaws, as named by the Open Web Application Security Project (OWASP).

主站蜘蛛池模板: 达日县| 大新县| 伊金霍洛旗| 东光县| 武强县| 当阳市| 类乌齐县| 鄱阳县| 南安市| 天祝| 凭祥市| 江都市| 南涧| 牟定县| 虞城县| 包头市| 兴宁市| 平湖市| 彰化县| 华容县| 长治市| 柏乡县| 井陉县| 高唐县| 沙田区| 易门县| 栾城县| 怀来县| 开化县| 景泰县| 清苑县| 嘉定区| 武陟县| 乌兰县| 嘉义县| 建水县| 都江堰市| 三原县| 盐亭县| 英德市| 邹平县|