Common Vulnerabilities, Threats, and Risks

This section reviews some of today’s more common vulnerabilities, threats, and risks that you will face. As a general rule, imperfect people create imperfect software, and they make mistakes unintentionally allowing vulnerabilities to be exploited by hackers. This list provides a brief synopsis and examples to help increase awareness, enabling you to protect and educate your users. The next section deals with attack examples.

Antivirus software: A software program dedicated to protecting your computer from viruses. As threats are evolving, so are these programs. With the decreasing occurrences of virus and increased exploits and attacks, these programs have developed into suites of programs designed ...

Get Network Security First-Step, Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.