.

Wednesday, September 25, 2019

Windows Vulnerability Research Paper Example | Topics and Well Written Essays - 500 words

Windows Vulnerability - Research Paper Example This report highlights the details of attacks conducted using this vulnerability, the systems that are vulnerable to this attack, the consequences and effects of the attacks, document some cases where such attacks have taken place and finally explore the fixes that exist so far. As stated above, such an attack takes advantage of the design flaws in transport layer, such that the attacker is able to intercept secure traffic from the target computer. In this way, the attacker could make use of an enticing website to attract a user within the organization. Any processing handled on that website, could trigger sensitive information to flow to the attackers website. A successful attack would be possible if the attacker is able to decrypt the traffic from the target systems, which is normally encrypted. However, the vulnerability will not be extended to users of SharePoint 2010 and Microsoft internet information services (IIS7). These systems will function normally with no fear of remote attacks unless they are deployed on machines with the above named operating systems. The uncontrolled and unauthorized access to target systems creates a channel that the attacker can use to acquire the organization’s sensitive data or plan future attacks. This means, sensitive information could be leaked to competitors; thus, diminishing any competitive advantages that may have existed. Currently, there are no reported cases of attacks conducted by exploiting this vulnerability. According to a vulnerability alert, this exploit has been unproven (Cisco). However, this does not belittle the fact that the vulnerability still exists and measures should be taken to ensure that the organization’s data is safe. Given the fact that this vulnerability can be exploited through remote means, it is important to ensure that the filters and checks are put in place to control

No comments:

Post a Comment