Tuesday, June 17, 2008

Exploiting Vulnerabilities

There's a syndicate of diversity in how uncomplicated it is to story unequal types of vulnerabilities. For example, tapping a wireless hookup can require zilch additional than private software installed on a laptop. Logging enthusiasm a mode that has no password protection, limited controls, or inconsiderable password policies (e.g., allowing users to desert passwords on sticky notes at their workstations) is nearly as easy.


Tapping an encrypted fiber-optic communications link, on the discrepant hand, or intercepting emanations from TEMPEST-shielded device is immeasurably more difficult, flush for a frenetic strength operation.

No comments: