WARNING:
JavaScript is turned OFF. None of the links on this concept map will
work until it is reactivated.
If you need help turning JavaScript On, click here.
Cette carte de concepts créée avec IHMC CmapTools traite de: Vulnerabilities, Software due to Inadequate attention to security, Software due to Inadequate Compiler Checking, Malicious Code which may be either a Virus, Vulnerabilities may be the result of older versions of OS or critical components, Vulnerabilities if discovered may lead to Attack or Exploit, Malicious Code which may be either a Worm, Probing Techniques such as Security Scanning Programs, Publicly Available Databases such as NIST's ICAT, Vulnerabilities are consciously and purposefully exploited by Malicious Code, Malicious Code which may be either a Trojan Horse, Software on Hosts, Software due to Poor coding practices, Vulnerabilities may be the result of weak or non existent cryptography, Vulnerabilities are catalogued in Publicly Available Databases, Publicly Available Databases such as Security Focus, Vulnerabilities exist in Software, Publicly Available Databases such as CERT, Software by far the most prevalent flaw is Buffer Overflow, Vulnerabilities can be discovered via Probing Techniques, Vulnerabilities may be the result of inadequate password protection