Ensuring Security in a System
Exploits A piece of software, a chunk of data, or a sequence of commands that takes advantage of a bug or vulnerability to cause unintended or unanticipated behavior to occur on computer software, hardware, or something electronic (usually computerized). An Exploit can cause, Gaining control of a computer system. Allowing privilege escalation Denial-of-service (DoS or related DDoS) attack. Vulnerability Assessment The process of defining, identifying, classifying and prioritizing vulnerabilities in Information systems, applications and network infrastructures and providing the organization doing the assessment with the necessary knowledge, awareness and risk background to understand the threats to its environment and react appropriately. Penetration Testing Also called pen testing or ethical hacking. The practice of testing a Information system, network or web application to find security vulnerabilities that an attacker could exploit. The process involves gathe...