virtual worlds 2009

Network Security

cat June 24th, 2011 by Virtual Keeper

In the course of this study was scanned about 3200 Web sites which found more than 210,000 vulnerabilities. And this is an average of about 66 security vulnerabilities for each Web site, ranging from the potentially serious, such as SQL-injection and cross site scripting, and ending with relatively minor, such as easily accessible for listing lists katalogov.Oblasti application vulnerability scanners to identify problems in information security vulnerability scanners are looking for weaknesses and vulnerabilities in information systems using databases that are constantly updated and supplemented by vendors. They fall about unsafe code in applications, incorrect (in terms of information security) settings and systems necessary updates and patches. Using these programs for complex scanning computers, servers and networking equipment, company-owned, with high accuracy to assert that the audited system will be found the vast majority of existing vulnerabilities. Vulnerability scanners have several advantages of using. They can be used to 'pre-scan', for example, to determine which devices and systems are in the network. Systems having the greatest number of vulnerabilities – those of an unknown system administrator. The companies are very common systems and services that were once used, but for now they are abandoned and therefore the software on them is not updated. For other opinions and approaches, find out what leader Naveen Selvadurai has to say.

Such information systems would pose a serious threat to information security throughout the network as a whole. Using scanners vulnerabilities in these cases, substantially reduce the threat to information security company. You can also use vulnerability scanners to assess the level of information security systems after the installation of patches and updates or after the configuration change the software or hardware.

cat Category: General | comments Comments Off on Network Security