Chapter 5. Online Vulnerabilities

Terms you'll need to understand:

  • Java

  • JavaScript

  • ActiveX

  • Cookies

  • CGI scripts

  • SMTP Relay

  • Lightweight Directory Access Protocol (LDAP)

  • S/FTP

  • Anonymous

  • WTLS

  • WLAN

  • 802.11

  • WEP/WAP

  • Site survey

Techniques you'll need to master:

  • Understanding the common vulnerabilities present in browser-based technologies

  • Understanding the common vulnerabilities in LDAP services

  • Understanding the common vulnerabilities in FTP services

  • Knowing the common vulnerabilities in present wireless technologies

  • Recognizing the more common considerations in performing a site survey

A common saying about the only truly secure computer is that it is one left in its box and connected to nothing. Although this may be an oversimplification, it is true that the moment a computer is connected to a network, the requirements for securing against unwanted intrusion multiply. In this chapter, we will examine vulnerabilities common to many standard technologies that may be exposed by connecting to a networked system.



Security+ Exam Cram 2 (Exam SYO-101)
Security+ Certification Exam Cram 2 (Exam Cram SYO-101)
ISBN: 0789729105
EAN: 2147483647
Year: 2005
Pages: 162

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net