logo

TRANSCRIPT Slide 2: There are a few limited mitigation

2 Pages443 Words57 Views
   

Added on  2023-01-16

TRANSCRIPT Slide 2: There are a few limited mitigation

   Added on 2023-01-16

ShareRelated Documents
TRANSCRIPT
Slide 2:
There are a few limited mitigation strategies available for these kind of attacks. These kind of
attacks are injection type of attack which directly affects the computers. This type of attack
tries to directly attach to the computer files and then control it. They try to change the flow of
control in the system. They are mainly applicable on operating systems, architectures and
other kinds of platform technologies. They can control authentication and even control
systems remotely.
Slide 3:
In critical security level, vulnerabilities (CVE-2018-20718) that can score the critical range
which comes up with list of characteristics.
Software comes up with data and control in the given way that comprises of data and control
in proper way. It generally lacks any kind of vulnerability for user control that results in
injection issues.
In general, exploitation is considered to be very much straightforward in nature. It merely the
attackers do not require any particular kind of authentication. A list of authentication
credential and knowledge about the victim is produced. It does not require to peruse the given
target user. Social engineering can be considered to be as one of the methods of performing
any of the given special function.
Slide 4:
Exploitation of the given vulnerability can easily result in root –level of both server and
infrastructure based devices.
TRANSCRIPT Slide 2: There are a few limited mitigation_1

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
CVE-2018-20718 VULNERABILITY TYPE: INJECTION.
|7
|477
|75

Vulnerabilities in Security Levels
|21
|3691
|92

Attack Surface Modelling
|5
|1084
|51

Cyber Security: Vulnerabilities, Exploitation, and Security Controls
|10
|2384
|453

Exploiting the Eternal Blue Vulnerability (CVE-2017-0144) in SMB
|8
|1879
|487

BYOD Policy Design for Southern Cross University
|8
|1829
|264