Trojan Horses Hidden in legitimate programs or files that attackers have altered to do more than what is expected
Worms Self-replicating programs that spread with no human intervention
Viruses Self-replicating programs that usually require some action on the part of the of the user to spread inadvertently to other programs
Types of Vulnerabilities Default software installations Ineffective use of authentication Patches not applied Too may open ports and services running Not analyzing incoming packets Backups not maintained and verified Lack of protection against malicious code
Prevention from Vulnerabilities Secure the Weakest Link Use Choke Points Limit Privileges Provide Defense in Depth Fail Securely Leverage Unpredictability Enlist the Users-educate users Embrace Simplicity- keep it simple
Detection and Response Detect Attacks close vulnerabilities Be Vigilant read about attacks and install security packs and updates read about attacks and install security packs and updates Watch the Watchers audit your own processes regularly
Conclusion Security flaws are inevitable and will always exist. The only solution is to look for effective security processes to avoid risk.