From the course: Ethical Hacking: Vulnerability Analysis
Unlock the full course today
Join today to access over 22,600 courses taught by industry experts or purchase this course individually.
Common causes of vulnerabilities
From the course: Ethical Hacking: Vulnerability Analysis
Common causes of vulnerabilities
- [Instructor] A vulnerability is a security flaw in a system that can be exploited by a threat to gain unauthorized access to an asset. Vulnerabilities or weaknesses exist in many different places. In software, operating systems, networks and even people. For example, if there is a threat of a rainstorm, not having an umbrella makes me vulnerable and I will most likely get wet. The causes of the vulnerabilities will depend on your environment and are not limited to a specific vendor. One of the causes of vulnerabilities is complexity. Today's organizations are large, complex and have many attack vectors. An attack vector is a way for a hacker to gain access into a system and can include software, networks and the user. The network is also a potential source of vulnerabilities as there are many devices and interfaces, ports on outward facing servers such as the mail and web servers in the DMZ. An exposure to protocol…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
Risks threats and vulnerabilities4m 16s
-
(Locked)
Common causes of vulnerabilities3m 42s
-
(Locked)
Assessing vulnerabilities3m 47s
-
(Locked)
Vulnerability management life cycle4m 44s
-
(Locked)
Modeling threats4m 7s
-
(Locked)
Challenge: Threat modeling exercise1m 9s
-
(Locked)
Solution: Threat modeling exercise2m 17s
-
-
-
-
-