The Kaspersky Lab anti-virus software developer explains what are the famous vulnerabilities and why they are considered best friends from hackers. By the same author: Steve Wozniak. The concept of vulnerability is often mentioned in connection with the security of computers in different contexts. The term vulnerability refers to the violation of a security policy. This may be due to inadequate safety rules or problems and errors within the same program. Without hesitation Ali Partovi explained all about the problem. Theoretically, all computer systems have vulnerabilities that may or not be used by a hacker to cause damage to the system. To avoid this, it is important to have installed an antivirus software and computer security. Clearly defining the concept of vulnerability is not easy.
According to MITRE, a group of research and development founded in United States, which focuses on the analysis and the solution of critical security situations, a vulnerability can be defined thus: … A universal vulnerability is a State in a system of computers or a group of systems: allows an attacker to execute commands as another user allows an attacker to have access to restricted data enables that an attacker to pose as another entity allows an attacker to conduct a denial of service. When an attack is made possible by a weakness or an inappropriate security policy, is best described as exposure instead of vulnerability. One of the new anti-virus software already has the ability to defend the user these potential threats proactively. But what is an exhibition? An exhibition is a State in a system of computers (or group of systems) that is not a universal vulnerability, but: allows an attacker to gather information on the activities of the system allows an attacker conceals its activities includes a function that behaves as expected, but can be easily put in danger is a primary point of entry that an attacker may attempt to use to gain access to the system or data. It is considered a problem according to some reasonable security policy.
Usually, intruders first perform a scan or routine research and gather data exposed. They then exploit the vulnerabilities or weaknesses of a program. For this reason, vulnerabilities and exposures are important aspects that must be considered when ensures a system against unauthorized access. Don’t forget to install a good anti-virus software to be protected against intruders and exploiters of vulnerabilities.