波音游戏-波音娱乐城赌球打不开

III. Exploitation on Patch Management

by JUCC ISTF
/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */ 
 

Although patches aim to mitigate the risks caused by information system's vulnerabilities, they may expose these systems to additional channels of attack and even be manipulated by hackers to become the carrier of malware. Universities should pay attention to the following vulnerabilities relevant to patch management.
 
Major Vulnerabilities in Patch Management
 
1. Fake Security Patch Alert
 
This exploitation is a kind of social engineering, where the hacker exploits vendor's routine of releasing patches and sends out fake security e-mails bent on infecting their targets with virus, worm, Trojan or any other malware.
Vendors with large user population are more likely to attract such kind of malicious activities. A recently reported incident reveals a malicious program named "KB453396-ENU.exe" attached to a fake Microsoft Tuesday Security Update on 4 January 2011. Another rogue website was reported to pop up a fake "Windows Security Centre" and fraudulently claims to find many non-existent malware on the victims' systems. If the user clicks on the popup window, the website starts to download a scareware in the background.
 

2. Malicious Insider

IT staff responsible for applying patches to production possess privileged system access, especially such patches are for the underlying infrastructure including operating system, database, network or even BIOS. Any malicious activities done by people like them will have devastating impact on universities' IT environment.

In addition, without proper testing before production deployment, IT staffs responsible for downloading patches also have the means to alter or sabotage the information systems by providing fake patch files to the deployment team.

3. Reverse Engineering

Most major attacks tend to occur in the hours immediately following the release of a security patch, as those are the moments when IT department will be detecting, acquiring, testing and deploying the patch, therefore the system will be in a particularly vulnerable state. The common method used by attackers, upon immediate release of a security patch, is for them to reverse engineer the patch in as little time as possible, identify the vulnerability and subsequently develop and release exploit code, thus hitting information systems at their weakest moments.

 

Reference:
http://www.pcworld.com/article/215491/worm_planted_in_fake_microsoft_security_update.html
http://www.gfi.com/lannetscan/patch-management.htm

 

老虎机游戏在线玩| 九乐棋牌下载| 百家乐技巧经| 15人百家乐官网桌布| 百家乐科学打| 百家乐官网永利娱乐平台| 大发888站群| 百家乐作弊内幕| 吉林省| 大发888娱乐出纳柜台| 百家乐官网平注常赢玩法更| 百家乐官网投注心得| 华侨人百家乐的玩法技巧和规则| 萝北县| 大发888东方鸿运娱乐| 杨公风水24山| 百家乐官网二游戏机| bet365 论坛| 博之道百家乐技巧| 百家乐官网娱乐网代理佣金| 电白县| 威尼斯人娱乐城送彩金| 真人百家乐海立方| 百家乐官网游戏唯一官网网站| 百家乐官网预测和局| 棋牌游戏平台排名| 福布斯百家乐的玩法技巧和规则| 百家乐官网网站那个诚信好| 网上百家乐官网合法吗| 大发扑克网站| 大发888游戏平台 送1666元礼金领取lrm | 百家乐官网赌博游戏| 百家乐官网单双打法| 肯博娱乐| 百家乐网上真钱赌场娱乐网规则 | 百家乐官网赚水方| 澳门百家乐官网网站bt| 屯昌县| 易博全讯网| 皇冠开户正网 | 百家乐园首选去澳|