Mezery

Wordconcepts

Základní vysvětlení

1.[díra;únik;únik]:Malé díryorgapstozástrčkyúniky.

2.[chyba;slabá místa;díra;mezera]:Tam, kde zákony, vyhlášky, smlouvy nebo dohody nejsou dobře formulovány, nedostatky by měly zalepit zjevné mezery v legislativě.

Vysvětlení citace

1.Mezery;malé díry.MingLushen's"Výňatek z StoppingRecords":"Levá Guan má kluzký a pomalý puls,čtvrtý lalok je netěsný a spodní část je propojena."

2.Zranitelnosti,nepřesné body.MaoDun's"FrostyLeavesJsouČervenéJakoFebruaryFlowers"5:"WangBoxhensoverysmart,když chce přijet.Musí mít na to jiné uspořádání.Smyčkyužse"provedl"opravený"část."

Informační technologie ve smyslu

VulnerabilityreferstotheweaknessordefectofasystemthatattacksorisdangeroustoaspecificthreatThesensitivityoftheincident,orthepossibilityofthethreatofanattack.Vulnerabilitiesmaycomefromdefectsinthedesignofapplicationsoftwareoroperatingsystemsorerrorsincoding,orfromdesigndefectsintheinteractiveprocessingofthebusinessorunreasonablelogicflow.Thesedefects,errorsorunreasonablepointsmaybeintentionallyorunintentionallyexploited,whichwilladverselyaffectanorganization’sassetsoroperations.Forexample,theinformationsystemisattackedorcontrolled,importantinformationisstolen,userdataistamperedwith,andthesystemisusedasAspringboardtoinvadeotherhostsystems.Judgingfromthevulnerabilitiesfoundsofar,therearefarmorevulnerabilitiesinapplicationsoftwarethanvulnerabilitiesinoperatingsystems,andvulnerabilitiesinWEBapplicationsystemsaccountforthevastmajorityofvulnerabilitiesininformationsystems.

1.Therelationshipbetweenthevulnerabilityandthespecificsystemenvironmentanditstime-relatedcharacteristics

Thevulnerabilitywillaffectawiderangeofhardwareandsoftwaredevices,includingTheoperatingsystemitselfanditssupportingsoftware,networkclientandserversoftware,networkroutersandsecurityfirewalls,etc.Inotherwords,theremaybedifferentsecurityvulnerabilitiesinthesedifferenthardwareandsoftwaredevices.Differenttypesofsoftwareandhardwaredevices,differentversionsofthesamedevice,differentsystemscomposedofdifferentdevices,andthesamesystemunderdifferentsettingconditionswillhavetheirowndifferentsecurityvulnerabilities.

Theissueofvulnerabilitiesiscloselyrelatedtotime.Fromthedayasystemisreleased,asusersdeepenitsuse,thevulnerabilitiesinthesystemwillcontinuetobeexposed,andthesevulnerabilitiesdiscoveredearlierwillalsobeconstantlypatchedbythepatchsoftwarereleasedbythesystemvendor,orreleasedinthefuture.Becorrectedinthenewversionofthesystem.Whilethenewversionofthesystemcorrectstheloopholesintheoldversion,itwillalsointroducesomenewloopholesanderrors.Soovertime,oldloopholeswillcontinuetodisappear,andnewloopholeswillcontinuetoappear.Vulnerabilitieswillalsoexistforalongtime.

Therefore,itismeaninglesstodiscussthevulnerabilitieswithoutthespecifictimeandspecificsystemenvironment.Wecanonlydiscussthepossiblevulnerabilitiesandfeasiblesolutionsfortheactualenvironmentsuchastheoperatingsystemversionofthetargetsystem,thesoftwareversionrunningonit,andtheserviceoperationsettings.

Atthesametime,itshouldbenotedthattheresearchonvulnerabilitiesmusttrackthelatestdevelopmentsinthecurrentcomputersystemanditssecurityissues.Thisissimilartotheresearchonthedevelopmentofcomputerviruses.Ifyoucan'tkeeptrackofnewtechnologiesinyourwork,youwon'thavetherighttotalkaboutsystemsecurityvulnerabilities,andeventheworkdonebeforewillgraduallylosevalue.

2.Poškození a prevence zranitelnosti

Theexistenceofvulnerabilitiescaneasilyleadtohackers’intrusionandthepresenceofviruses,whichcanleadtodatalossandtampering,Privacydisclosureandevenmonetaryloss,suchas:thewebsiteishackedduetoloopholes,websiteuserdatawillbeleaked,websitefunctionsmaybedisruptedandsuspended,ortheserveritselfiscontrolledbytheintruder.Inthecurrentdevelopmentofdigitalproducts,vulnerabilitieshavebeenextendedfromcomputersascarrierstodigitalplatforms,suchasmobilephoneQRcodevulnerabilities,Androidapplicationvulnerabilities,etc...

Systémová zranitelnost

Přehled

Systémová zranitelnostrefertoflawsinthelogicdesignofapplicationsoftwareoroperatingsystemsoftwareorerrorsinwriting.ThisflaworerrorcanbeexploitedbycriminalsorcomputerhackersbyplantingTrojanhorsesorviruses.Attackorcontroltheentirecomputerbyothermeans,therebystealingimportantdataandinformationinyourcomputer,orevendestroyingyoursystem.

Zásada

Theproblemofwindowssystemvulnerabilitiesiscloselyrelatedtotime.Fromthedayawindowssystemisreleased,asusersdeepenuse,thevulnerabilitiesinthesystemwillcontinuetobeexposed,andthesevulnerabilitiesdiscoveredearlierwillalsobeconstantlypatchedbythesystemvendor:Microsoft’spatchsoftware.Oritwillbecorrectedinanewversionofthesystemthatwillbereleasedlater.Whilethenewversionofthesystemcorrectstheloopholesintheoldversion,itwillalsointroducesomenewloopholesanderrors.

Soovertime,oldsystemvulnerabilitieswillcontinuetodisappear,andnewsystemvulnerabilitieswillcontinuetoappear.Systémová zranitelnostwillalsoexistforalongtime.

MicrosoftSecurityBulletin

Brzy ráno 12. února 2014 společnost Microsoft vydala 7 oprav zranitelnosti, včetně 4 "kritických" úrovní a 3 "kritických" úrovní zranitelnosti. Opravené vícenásobné zranitelnosti v Internet Exploreru, .Net a Windows a konkrétní zranitelnost ve Windows8.

OnJanuary16,2014,theJanuarysecuritybulletinwasreleased.Thepatchlevelsofthe4vulnerabilitiesareall"important".TheyfixtheMSOfficeWord,Windows7kernelandtheoldversionoftheWindowskerneldriver.Therearemultipleremotecodeexecutionandprivilegeescalationvulnerabilities.AlsopushedaretheversionupdateinstallationpackageofAdobeFlashPlayer12andthesecurityupdateofAdobeReader.

MicrosoftgenerallyreleasessecuritybulletinsonthesecondTuesdayofeachmonth,whichiscalled"PatchTuesday."

Úroveň

Zranitelnosti jsou klasifikovány do čtyř typů podle jejich závažnosti: „Naléhavé“, „Důležité“, „Varování“ a „Pozor“. Obecně řečeno, to, co je definováno jako důležité na webových stránkách Microsoftu, by se mělo včas aktualizovat.

Oprava zranitelnosti

ThesystemautomaticallyupdatesUpdate,orautomaticallyrepairsitwithsecuritysoftwaresuchasComputerManager.

Klasifikace

Fliesdonotstareatseamlesseggs.Intruderscaneasilybreakintothesystemaslongastheyfindacrackinthecomplexcomputernetwork.Soknowingwheretheseseamsarelikelytobeiscrucialtorepairingthem.Usuallycracksaremainlymanifestedinsoftwarecompilationbugs,impropersystemconfiguration,passwordtheft,cleartextcommunicationinformationbeingmonitored,anddefectsintheinitialdesign.

Při psaní softwaru jsou chyby

Whetheritisserverprogram,clientsoftwareoroperatingsystem,aslongasitiswrittenincode,therewillbevariousdegreesofbugs.Bugsaremainlydividedintothefollowingcategories:

(1)Bufferoverflow:Referstotheintruderenteringastringofmorethanthespecifiedlengthintherelevantinputitemsoftheprogram,andtheexcesspartisusuallywhattheintruderwantsTheattackcodetobeexecuted,andtheprogramwriterdidnotchecktheinputlength,whicheventuallycausedtheextraattackcodetooccupythememorybehindtheinputbufferandbeexecuted.Don'tthinkthat200charactersareenoughfortheloginusernameandnolongercheckthelength.Theso-calledanti-littlebutnotgentleman,theintruderwilltryeverymeanstotrytheattack.

(2).Unexpectedjointuseproblem:Aprogramisoftencomposedofmultiplelayersofcodewithdifferentfunctions,eveninvolvingthelowestoperatingsystemlevel.Intrudersusuallyusethisfeaturetoinputdifferentcontentfordifferentlayersinordertoachievethepurposeofstealinginformation.Forexample:ForaprogramwrittenbyPerl,theintrudercanentersomethinglike"mailoperatingsystemtocallthemailprogram,andsendanimportantpasswordfiletotheintruder.Borrowaknifetokillsomeone,borrowaMailtosenda"letter",itistrueHigh!

(3)Noexpectedcheckofinputcontent:Someprogrammersareafraidoftroubleanddonotperformexpectedmatchingcheckoninputcontent,whichmakesthejobofintruderdeliveringbombseasyandsimple.

(4)Raceconditions:Therearemoreandmoremulti-taskingandmulti-threadedprograms.Whileimprovingtheefficiencyofoperation,wemustalsopayattentiontotheproblemsofRaceconditions.Forexample:ProgramAandProgramBareinaccordancewith"Read/Modify/Write"Operateafileintheorderof.WhenAfinishesreadingandmodifying,Bstartstoimmediatelyexecuteallthe“read/modify/write”tasks.Atthistime,Acontinuestoperformthewritingwork,andtheresultisthatB’soperationhasnoperformance!Intrudersmayusethisvulnerabilityintheprocessingsequencetorewritesomeimportantfilestoachievethepurposeofbreakingintothesystem.Therefore,programmersshouldpayattentiontothesequenceoffileoperationsandlockingissues.

Nesprávná konfigurace systému

(1)Insufficientdefaultconfiguration:Manysystemshavedefaultsecurityconfigurationinformationafterinstallation,whichisusuallycalledeasytouse.Unfortunately,easytousealsomeanseasytobreakin.Therefore,thedefaultconfigurationmustbeabandoned.

(2).Administratorlaziness:Oneofthemanifestationsoflazinessistokeeptheadministratorpasswordemptyafterthesystemisinstalledandnotmodifyitafterwards.Youknow,thefirstthingtheintruderhastodoistosearchthenetworkforsuchmachineswithanemptypasswordfortheadministrator.

(3)Temporaryport:sometimesfortestingpurposes,theadministratorwillOpenatemporaryportonthemachine,butforgottoprohibititafterthetest,thiswillgivetheintruderaholetofindandaleaktodrill.Theusualsolutionis:unlessaportismandatory,itisprohibitedIt!Ingeneral,securityauditdatapacketscanbeusedtodiscoversuchportsandnotifytheadministrator.

(4),trustrelationship:systemsbetweennetworksoftenestablishtrustrelationshipstofacilitateresourcesharing,butthisItalsogivesintrudersthepossibilityofindirectattacks.Forexample,aslongasonemachineinthetrustgroupiscompromised,itispossibletofurtherattackothermachines.Therefore,thetrustrelationshipmustbestrictlyreviewedtoensureatruesecurityalliance.

Krádež hesla

(1)Slabé heslo: znamená to, že ačkoliv je heslo nastaveno, je tak jednoduché, že nemůže být snazší pro narušení vetřelce.

(2)Dictionaryattack:referstotheintruderusingaprogramthatusesadictionarydatabasecontainingusernamesandpasswordstocontinuouslytrytologintothesystemuntilitsuccessfullyenters.ThereisnodoubtthatthisThekeytothiswayItliesinhavingagooddictionary.

(3)Bruteforceattack:similartodictionaryattack,butthisdictionaryisdynamic,thatis,thedictionarycontainsallpossiblecharactercombinations.Forexample,a4-characterpasswordcontaininguppercaseandlowercasehasabout500,000combinations,anda7-characterpasswordcontaininguppercaseandlowercaseandpunctuationhasabout10trillioncombinations.Forthelatter,ittakesaboutafewmonthsforageneralcomputertotestitagain.Seethebenefitsoflongpasswords,it’sreallyalotofmoney!

Sniffingun zašifrovaná komunikační data

(1),sharedmedia:thetraditionalEthernetstructureisveryItisconvenientforanintrudertoplaceasnifferonthenetworktoviewthecommunicationdataonthenetworksegment,butifaswitchedEthernetstructureisadopted,thesniffingbehaviorwillbecomeverydifficult.

(2)Serversniffing:Switchednetworksalsohaveanobviousshortcoming.Intruderscaninstallasniffersoftwareontheserver,especiallytheserverthatservesasaroutingfunction,andthenpassitThecollectedinformationbreaksintoclientmachinesandtrustedmachines.Forexample,althoughtheuser'spasswordisnotknown,whentheuserlogsinusingTelnetsoftware,hecansniffthepasswordheentered.

(3)Remotesniffing:ManydeviceshaveRMON(Remotemonitor,remotemonitoring)functionsothatmanagerscanusepubliccommunitystringsforremotedebugging.Withthecontinuouspopularizationofbroadband,intrudersarebecomingmoreandmoreinterestedinthisbackdoor.

Konstrukční vady

(1),TCP/IPprotocolflaws:TCP/IPprotocolisnowwidelyused,butitwasdesignedtoberampantbyintrudersItwasdesignedlongagotoday.Therefore,therearemanydeficienciesthatcausesecurityvulnerabilities,suchassmurfattacks,ICMPUnreachablepacketdisconnection,IPaddressspoofing,andSYNflood.However,thebiggestproblemisthattheIPprotocolisveryeasyto"trust",thatis,intruderscanforgeandmodifyIPdatapacketsatwillwithoutbeingdiscovered.Ipsecprotocolhasbeendevelopedtoovercomethisshortcoming,butithasnotbeenwidelyused.

Systémový útok

Systémový útokreferstoaperson'sillegaluseordestructionofresourcesinaninformationsystem,aswellasunauthorizedactsthatcausethesystemtolosepartorallofitsservicefunctions.

Theattackactivitycangenerallyberoughlydividedintotwotypes:remoteattackandinternalattack.NowwiththeprogressoftheInternet,theremoteattacktechnologyamongthemhasbeengreatlydeveloped,andthethreatsaregettingbiggerandbigger,andtherearemoresystemvulnerabilitiesandrelatedknowledgeinvolved,soithasimportantresearchvalue.

Související články
HORNÍ