www.howtonetwork.org

CCNA & CCNP Certifcation Training

  • About
  • Contact
  • FAQ
  • Join
  • Home
  • CCNA
    • ICND1
    • ICND2
    • 101 CCNA LABS
  • CCNP
    • ROUTE
    • SWITCH
    • TSHOOT
    • 101 CCNP LABS
  • CompTIA
    • Security+
    • Network+
  • Design
    • CCDA
    • CCDP
You are here: Home / CompTIA / Network+ / Section V: Network Security / Chapter 30: Common Threats and Vulnerabilities / Application Vulnerabilities

Application Vulnerabilities

Applications and individual host machines are often the ultimate target of the attacker or the malicious user. Generally, they want to get permission to read sensitive data, write changes to the hard drive, or compromise data confidentiality and integrity.

Attackers try to exploit bugs in the operating systems (for servers, hosts, and network devices OS) and to abuse vulnerabilities in various applications to gain access to the system. Some applications are very vulnerable, mostly because they were not properly tested and were launched without advanced security features in mind.

After gaining basic access to a system, attackers will use a . . .

The content below this message is for members only.

About Us

This is a free bonus site for members of www.howtonetwork.com

Copyright

The content on this copyright Reality Press Ltd.
Copyright Reality Press Ltd.