- AWS Certified Advanced Networking:Specialty Exam Guide
- Marko Sluga
- 133字
- 2021-06-24 14:14:52
Exploiting vulnerabilities
There are several types of vulnerability attacks that can be executed over the network:
- Exploiting a vulnerability: An attacker exploits a known vulnerability of an unpatched system for DoS or to gain access
- Zero-day attacks: An attacker exploits a newly released vulnerability of the system for DoS or to gain access before the vendor provides a patch
- Unknown vulnerability: An attacker exploits a known vulnerability of the system for DoS or to gain access
Protecting from vulnerabilities is a complicated matter as it requires tight coordination between the network, security, and the operations team to detect, identify, and prevent vulnerability attacks from being carried out. However, AWS WAF offers features that help prevent the exploitation of the most important security flaws, as named by the Open Web Application Security Project (OWASP).
推薦閱讀
- Ansible Configuration Management
- 大數據管理系統
- Visualforce Development Cookbook(Second Edition)
- Mastercam 2017數控加工自動編程經典實例(第4版)
- 腦動力:C語言函數速查效率手冊
- Ansible Quick Start Guide
- Drupal 7 Multilingual Sites
- 大數據改變世界
- ROS機器人編程與SLAM算法解析指南
- 21天學通C++
- Expert AWS Development
- Maya極速引擎:材質篇
- Cloudera Administration Handbook
- 數據庫系統原理及應用教程(第5版)
- Learning Azure Cosmos DB