Tuesday, April 30, 2019

Windows Vulnerability Research Paper Example | Topics and Well Written Essays - 500 words

Windows Vulnerability - Research Paper ExampleThis report highlights the details of attacks conducted using this photograph, the systems that are undefendable to this attack, the consequences and effects of the attacks, document some cases where much(prenominal) attacks have taken place and finally explore the fixes that be so far.As stated to a higher place, such an attack takes advantage of the design flaws in transport layer, such that the attacker is able to intercept secure traffic from the target computer. In this way, the attacker could make affair of an enticing website to attract a delectationr within the organization. Any processing handled on that website, could trigger erogenous discipline to flow to the attackers website. A successful attack would be possible if the attacker is able to decipher the traffic from the target systems, which is normally encrypted.However, the exposure will not be extended to users of SharePoint 2010 and Microsoft internet nurture s ervices (IIS7). These systems will function normally with no fear of remote attacks unless they are deployed on machines with the above named operating systems.The uncontrolled and unauthorized access to target systems creates a channel that the attacker can use to acquire the organizations sensitive data or plan future attacks. This means, sensitive information could be leaked to competitors thus, diminishing any competitive advantages that may have existed.Currently, there are no describe cases of attacks conducted by exploiting this vulnerability. According to a vulnerability alert, this exploit has been unproven (Cisco). However, this does not belittle the fact that the vulnerability still exists and measures should be taken to ensure that the organizations data is safe.Given the fact that this vulnerability can be exploited through remote means, it is important to ensure that the filters and checks are put in place to control