answersLogoWhite

0


Best Answer

Every network is different; the only way to find out the vulnerabilities in a given network is to initiate an audit of the network. One piece of that is risk assessment, and from that you develop a vulnerability matrix.

User Avatar

Wiki User

14y ago
This answer is:
User Avatar
More answers
User Avatar

Wiki User

14y ago

The general vulnerabilities for most types of software are: SQL injection attacks, buffer overflow, HTTP injections, and general bugs in the software themselves. It is very often that crackers find a bug in the software itself and exploit it by writing code themselves.

This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What are the vulnerabilities in the network?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

Network Tasking Orders NTOs are?

Used to combat critical network vulnerabilities


What is the difference between operating system security and network security?

operating system security concerns about vulnerabilities on specific operating system network system security concerns about vulnerabilities of the entire network regrdless how diverse or complex the network is.


Which type of network attack exploits vulnerabilities in the compromised system with the intent of propagating itself across a network?

worm


What is a major characteristic of a Worm?

exploits vulnerabilities with theintent of propagating itself across a network


What are current network threats?

While dealing with computers in a network, threats will always emerge. The current network threats include advanced DDos attacks, botnet attacks, insecure applications, vulnerabilities in embedded systems and sophisticated viruses.


You want to look for open ports on a network host to assess vulnerabilities?

There are several tools for this process. It depends on whether you want to probe from the inside of the network or from the outside of the network. See the related link for Steve Gibson's ShieldsUp! site that will probe your system from the outside to see what is open and possibly vulnerable.


How viruses get into computer network?

A network virus makes use of networking protocols or application to spread. Network viruses make uses of system network mechanisms, search local and remote system information, monitor network traffic and take advantage of system and network vulnerabilities, and build network connections.


What is method of evaluating the security of computer system or network by simulating a malicious attack instead of just scaning for vulnerabilities?

Using a penetration testing tool would accomplish this purpose.


What is traffic analysis?

Traffic analysis is a method used by attackers to monitor and analyze network traffic to gather information about its patterns, volume, and behavior. This can help attackers identify vulnerabilities in the network and plan future attacks more effectively. It can also be used for legitimate purposes, such as optimizing network performance and security.


Risk is determined from the analysis of available safeguards for IS assets security requirements threats and?

a. vulnerabilities


Risk is determined from the analysis of available safeguards for IS assets security requirements threats and vulnerabilities?

vulnerabilities


What are Vulnerabilities defined as?

'Vulnerabilities' are areas where people or things are susceptible to danger.