百家乐怎么玩-澳门百家乐官网娱乐城网址_网上百家乐是不是真的_全讯网888 (中国)·官方网站

III. Exploitation on Patch Management

by JUCC ISTF
/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */ 
 

Although patches aim to mitigate the risks caused by information system's vulnerabilities, they may expose these systems to additional channels of attack and even be manipulated by hackers to become the carrier of malware. Universities should pay attention to the following vulnerabilities relevant to patch management.
 
Major Vulnerabilities in Patch Management
 
1. Fake Security Patch Alert
 
This exploitation is a kind of social engineering, where the hacker exploits vendor's routine of releasing patches and sends out fake security e-mails bent on infecting their targets with virus, worm, Trojan or any other malware.
Vendors with large user population are more likely to attract such kind of malicious activities. A recently reported incident reveals a malicious program named "KB453396-ENU.exe" attached to a fake Microsoft Tuesday Security Update on 4 January 2011. Another rogue website was reported to pop up a fake "Windows Security Centre" and fraudulently claims to find many non-existent malware on the victims' systems. If the user clicks on the popup window, the website starts to download a scareware in the background.
 

2. Malicious Insider

IT staff responsible for applying patches to production possess privileged system access, especially such patches are for the underlying infrastructure including operating system, database, network or even BIOS. Any malicious activities done by people like them will have devastating impact on universities' IT environment.

In addition, without proper testing before production deployment, IT staffs responsible for downloading patches also have the means to alter or sabotage the information systems by providing fake patch files to the deployment team.

3. Reverse Engineering

Most major attacks tend to occur in the hours immediately following the release of a security patch, as those are the moments when IT department will be detecting, acquiring, testing and deploying the patch, therefore the system will be in a particularly vulnerable state. The common method used by attackers, upon immediate release of a security patch, is for them to reverse engineer the patch in as little time as possible, identify the vulnerability and subsequently develop and release exploit code, thus hitting information systems at their weakest moments.

 

Reference:
http://www.pcworld.com/article/215491/worm_planted_in_fake_microsoft_security_update.html
http://www.gfi.com/lannetscan/patch-management.htm

 

百家乐官网的薇笑打法| 千亿百家乐官网的玩法技巧和规则| 博狗备用| 百家乐游戏机说明书| 百家乐官网娱乐网站| 百家乐官网招商用语| 百家乐博娱乐网| 澳门百家乐官网看路博客| 百家乐庄闲预测| 邢台市| 百家百家乐视频游戏世界| 网上玩百家乐官网技巧| 大发888游乐场下载| VIP百家乐-挤牌卡安桌板| 电子百家乐官网博彩正网| 大发888娱乐场下载 制度| 女神百家乐官网的玩法技巧和规则 | 网上棋牌是真的吗| 百家乐技巧-百家乐开户指定代理网址| 精英娱乐城开户| 百家乐游戏程序下载| 百家乐官网赌场娱乐网规则 | 在线百家乐官网怎么下注| 德州扑克规则| 赌场百家乐图片| 澳门百家乐官网怎么玩| 足球.百家乐官网投注网出租| 开16个赌场敛财| 大发888娱乐游戏可以玩吗| 百家乐真钱送彩金| 娱乐百家乐官网可以代理吗| 百家乐官网购怎么样| 皇家赌场下载| 大发888游戏平台188| 百家乐过滤| 百家乐庄闲符号记| 网上百家乐能作弊吗| 百家乐官网策略网络游戏信誉怎么样| 赌场百家乐官网代理| 百家乐官网揽子打法| 百家乐官网策略详解|