波音游戏-波音娱乐城赌球打不开

III. Exploitation on Patch Management

by JUCC ISTF
/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */ 
 

Although patches aim to mitigate the risks caused by information system's vulnerabilities, they may expose these systems to additional channels of attack and even be manipulated by hackers to become the carrier of malware. Universities should pay attention to the following vulnerabilities relevant to patch management.
 
Major Vulnerabilities in Patch Management
 
1. Fake Security Patch Alert
 
This exploitation is a kind of social engineering, where the hacker exploits vendor's routine of releasing patches and sends out fake security e-mails bent on infecting their targets with virus, worm, Trojan or any other malware.
Vendors with large user population are more likely to attract such kind of malicious activities. A recently reported incident reveals a malicious program named "KB453396-ENU.exe" attached to a fake Microsoft Tuesday Security Update on 4 January 2011. Another rogue website was reported to pop up a fake "Windows Security Centre" and fraudulently claims to find many non-existent malware on the victims' systems. If the user clicks on the popup window, the website starts to download a scareware in the background.
 

2. Malicious Insider

IT staff responsible for applying patches to production possess privileged system access, especially such patches are for the underlying infrastructure including operating system, database, network or even BIOS. Any malicious activities done by people like them will have devastating impact on universities' IT environment.

In addition, without proper testing before production deployment, IT staffs responsible for downloading patches also have the means to alter or sabotage the information systems by providing fake patch files to the deployment team.

3. Reverse Engineering

Most major attacks tend to occur in the hours immediately following the release of a security patch, as those are the moments when IT department will be detecting, acquiring, testing and deploying the patch, therefore the system will be in a particularly vulnerable state. The common method used by attackers, upon immediate release of a security patch, is for them to reverse engineer the patch in as little time as possible, identify the vulnerability and subsequently develop and release exploit code, thus hitting information systems at their weakest moments.

 

Reference:
http://www.pcworld.com/article/215491/worm_planted_in_fake_microsoft_security_update.html
http://www.gfi.com/lannetscan/patch-management.htm

 

闲和庄百家乐娱乐平台| 走地皇娱乐城| 百家乐真人赌场娱乐网规则| 威尼斯人娱乐场网站| 百家乐官网10个人| 威尼斯人娱乐城老| 百家乐官网韩泰阁| 明升百家乐QQ群| 百家乐玩法说| 百家乐官网电话投注怎么玩| 赌百家乐2号破解| 百家乐官网博娱乐场开户注册| 曼哈顿百家乐娱乐城| 澳门百家乐官网怎赌才能赚钱| 百家乐庄家必赢诀窍| 澳门百家乐官网打缆| 百家乐和怎么算输赢| 百家乐官网网站赌博| 大发888网站多少| 噢门百家乐注码技巧| 现金百家乐官网破解| 二八杠论坛| 澳门百家乐庄闲和| 百家乐官网娱乐官网| 姚记娱乐城官网| 888百家乐的玩法技巧和规则 | 百家乐官网娱乐城怎么样| 缅甸百家乐网上投注| 百家乐官网投注网站是多少| 棋牌娱乐| 梦幻城百家乐的玩法技巧和规则| 百家乐官网桌小| 中华娱乐城| 巴黎人百家乐的玩法技巧和规则| 百家乐官网园游戏77sonci...| 为什么百家乐玩家越来越多选择网上百家乐 | 百家乐官网心态研究| 大发888投注明升网址| 百家乐伴侣破解版| 百家乐最保险的方法| 安泽县|