1.

What Are The Ways In Which Attackers Can Infiltrate The System?

Answer»
  • Web servers can be infiltrated using the command shell by an attacker to READ the HTML FILES that is getting transferred. 
  • If the set-uid scripts are not proper and bad then the infiltration can HAPPEN by the attacker. 
  • The processes are not given proper permissions so that the PASSWORD can be changed by using the “passwd” command to change the password of the system.
  • This also authenticates the user for accessing the system and the files on it containing the data. 
  • The program that is used in the operating system doesn’t follow the PRINCIPLE of least privilege and lead to security issues.



Discussion

No Comment Found