Thursday, February 25, 2010

An overview of Vulnerabilities

When it comes to computer security, the term vulnerability is a weakness that permits an attacker to diminish Information assurance of the particular system. Vulnerability is the junction of three elements. First element is the flaw or system susceptibility, second one is the attacker access for the flaw and third one is attacker ability to develop the flaw.

For being vulnerable, an attacker should have at least one technique or applicable tool, which will unite it with the system weakness. In such framework, vulnerability is also called as the attack surface.

A security risk can be categorized as vulnerability. Exploit is vulnerability with fully implemented attacks including one or more recognized instances of working.

Now we will look at what are the causes of the vulnerability

  • Complexity- Complex and large systems amplify the probability of unintended access points and flaws.
  • Familiarity- Utilizing well known, common code, operating systems, software or hardware raises the probability of an attacker finding the tools and knowledge to develop the flaw.
  • Connectivity- Additional physical connections, ports, privileges, services and protocols and the time each one of these are accessible amplify the vulnerability.
  • Password management flaws- Most of the computer users make use of weak passwords that can be easily found by brute force. Some times users store the password on their PC where a program is capable for accessing it. Furthermore, users utilize same password for many websites and programs.
  • Essential operating system design flaws- Operating system designer selects to implement sub-optimal policies on program/user management. This operating system flaw can facilitate malware and viruses for executing commands on behalf of the administrator.
  • Internet Website Browsing - Some internet websites can include harmful adware or spyware, which can be installed in automatic manner on the computer systems. If anyone visits those websites, computer becomes infected. After this, spyware starts collecting personal information and it is passed to the third party.
  • Software bugs- The software bug permit the attacker to make unauthorized use of an application.

Most of the software tools exist nowadays that can help in the discovery as well as removal of vulnerabilities in a computer system. These tools can render a finer overview of probable vulnerabilities. You cannot simply rely on scanners. Vulnerabilities are found in each of main operating system including Mac OS, Windows, and diverse forms of Open VMS, UNIX and Linux. The best and smart way to eliminate the probabilities of a vulnerability being utilized against a system is by means of continuous vigilance, together with careful system maintenance. 

If you are facing some problems with your Pc or are interested in knowing more about this then Save My System can help you out. We offer all sort of reliable services for data recovery, IT security, computer support and wireless network at viable charges. For more queries, you can contact our London PC repair serve site.