WARNING:
JavaScript is turned OFF. None of the links on this concept map will
work until it is reactivated.
If you need help turning JavaScript On, click here.
Cette carte de concepts créée avec IHMC CmapTools traite de: Hosts, Exploit or Attack may be initiated remotely (Internet), Exploit or Attack may be initiated locally (internally), servers typically provide at least several services via the network, Hosts are usually connected to Network, User-level Programs such as Word Processor, Hosts are typically either workstations, Loss of Data, Exploit or Attack may lead to Compromise, Authorized Human User utilizes interactively and directly workstations, Hosts are typically either servers, User-level Programs such as FTP Clients, incoming connections on specific ports, Vulnerabilities if discovered may result in Exploit or Attack, servers listen for a variety of incoming connections, Exploit or Attack may lead to Unauthorized Access, User-level Programs such as Email Clients, Vulnerabilities may exist at either Application level, Compromise of Data, Exploit or Attack may lead to Loss, specific ports which is commonly identified with a single services via the network