Vulnerability analysis, also known as vulnerability assessment, is a process that defines, identifies, and classifies the security holes (vulnerabilities) in a computer, network, or an application. In addition, vulnerability analysis can forecast the effectiveness of proposed countermeasures and evaluate their actual effectiveness after they are put into use. Vulnerability Analysis and Defense for the Internet provides packet captures, flow charts and psuedo code, which enable a user to identify if an application/protocol is vulnerable. If an application is vulnerable, then a user will be able to understand the complexity, and the theory behind the vulnerability. This edited volume also includes case studies where latest exploits are discussed.Spyware providers often pay royalty to any entity that enables their software to be installed on additional computers. A review of ... The table show in figure 16.0 provides a list of spyware that exploit different vulnerabilities in applications to install themselves on victim machines. ... Spyware can execute remote code or can cause a denial of service attack based on the type of vulnerability in the software.
Title | : | Vulnerability Analysis and Defense for the Internet |
Author | : | Abhishek Singh, B. Singh, H. Joseph |
Publisher | : | Springer Science & Business Media - 2008-01-24 |
You must register with us as either a Registered User before you can Download this Book. You'll be greeted by a simple sign-up page.
Once you have finished the sign-up process, you will be redirected to your download Book page.
How it works: