- AWS Certified Advanced Networking:Specialty Exam Guide
- Marko Sluga
- 133字
- 2021-06-24 14:14:52
Exploiting vulnerabilities
There are several types of vulnerability attacks that can be executed over the network:
- Exploiting a vulnerability: An attacker exploits a known vulnerability of an unpatched system for DoS or to gain access
- Zero-day attacks: An attacker exploits a newly released vulnerability of the system for DoS or to gain access before the vendor provides a patch
- Unknown vulnerability: An attacker exploits a known vulnerability of the system for DoS or to gain access
Protecting from vulnerabilities is a complicated matter as it requires tight coordination between the network, security, and the operations team to detect, identify, and prevent vulnerability attacks from being carried out. However, AWS WAF offers features that help prevent the exploitation of the most important security flaws, as named by the Open Web Application Security Project (OWASP).
推薦閱讀
- PowerShell 3.0 Advanced Administration Handbook
- Ansible Quick Start Guide
- Getting Started with Oracle SOA B2B Integration:A Hands-On Tutorial
- 錯(cuò)覺:AI 如何通過數(shù)據(jù)挖掘誤導(dǎo)我們
- 讓每張照片都成為佳作的Photoshop后期技法
- Docker Quick Start Guide
- INSTANT Autodesk Revit 2013 Customization with .NET How-to
- 零起點(diǎn)學(xué)西門子S7-200 PLC
- Bayesian Analysis with Python
- Mastering Ansible(Second Edition)
- Web璀璨:Silverlight應(yīng)用技術(shù)完全指南
- 人工智能:智能人機(jī)交互
- MongoDB 4 Quick Start Guide
- 案例解說Delphi典型控制應(yīng)用
- Java求職寶典