波音游戏-波音娱乐城赌球打不开

III. Exploitation on Patch Management

by JUCC ISTF
/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */ 
 

Although patches aim to mitigate the risks caused by information system's vulnerabilities, they may expose these systems to additional channels of attack and even be manipulated by hackers to become the carrier of malware. Universities should pay attention to the following vulnerabilities relevant to patch management.
 
Major Vulnerabilities in Patch Management
 
1. Fake Security Patch Alert
 
This exploitation is a kind of social engineering, where the hacker exploits vendor's routine of releasing patches and sends out fake security e-mails bent on infecting their targets with virus, worm, Trojan or any other malware.
Vendors with large user population are more likely to attract such kind of malicious activities. A recently reported incident reveals a malicious program named "KB453396-ENU.exe" attached to a fake Microsoft Tuesday Security Update on 4 January 2011. Another rogue website was reported to pop up a fake "Windows Security Centre" and fraudulently claims to find many non-existent malware on the victims' systems. If the user clicks on the popup window, the website starts to download a scareware in the background.
 

2. Malicious Insider

IT staff responsible for applying patches to production possess privileged system access, especially such patches are for the underlying infrastructure including operating system, database, network or even BIOS. Any malicious activities done by people like them will have devastating impact on universities' IT environment.

In addition, without proper testing before production deployment, IT staffs responsible for downloading patches also have the means to alter or sabotage the information systems by providing fake patch files to the deployment team.

3. Reverse Engineering

Most major attacks tend to occur in the hours immediately following the release of a security patch, as those are the moments when IT department will be detecting, acquiring, testing and deploying the patch, therefore the system will be in a particularly vulnerable state. The common method used by attackers, upon immediate release of a security patch, is for them to reverse engineer the patch in as little time as possible, identify the vulnerability and subsequently develop and release exploit code, thus hitting information systems at their weakest moments.

 

Reference:
http://www.pcworld.com/article/215491/worm_planted_in_fake_microsoft_security_update.html
http://www.gfi.com/lannetscan/patch-management.htm

 

百家乐官网又称为什么| 贝博百家乐官网的玩法技巧和规则| 如何胜百家乐的玩法技巧和规则| 百家乐官网视频游365| 威尼斯人娱乐城线上博彩| 百家乐官网佛泰阁| 大发888-娱乐场| 百家乐官网庄家闲| 多彩国际娱乐| 百家乐输惨了| 988百家乐官网娱乐| 大发888娱乐城34| 百家乐八卦投注法| 真钱百家乐官网公司哪个好| 奔驰娱乐城开户| 汇丰百家乐娱乐城| 百家乐官网bp| 新思维百家乐官网投注法| 百家乐剁手| 百家乐官网第三张规则| 金博士百家乐官网娱乐城| 金冠娱乐城官网| 大发888 网站被攻击了| 百家乐赌场怎么玩| ag百家乐官网下载| 百家乐官网试玩账户| 百家乐分析| 大发888娱乐城好吗| 王子百家乐的玩法技巧和规则| 优博百家乐现金网平台| 红9百家乐官网的玩法技巧和规则 高尔夫百家乐官网的玩法技巧和规则 | 缅甸百家乐官网的玩法技巧和规则| 百家乐官网对打反水| 皇冠体育| 博狗备用| 大发888打法888| 时时博百家乐的玩法技巧和规则| 百家乐电投网址| 网上百家乐导航| 百家乐概率计算过程| 百家乐所有技巧|