security vulnerabilities
Ahmed shamel noori
Vulnerability
• A flaw or weakness in system security (procedures, design, implementation,
or internal controls) that may result in a security breach or a violation of the
system's security policy.
Briefly vulnerability Is a point where a system is susceptible to attack.
• Internet technology has been and continues to be vulnerable. There have been
reports of all sorts of loop holes, weaknesses, and gaping holes in both software
and hardware technologies.
• No one knows how many of these vulnerabilities there are both in software and
hardware. The assumption is that there are thousands. As history has shown us, a
few are always discovered every day by hackers .
Internet Technology Vulnerability
• Although the list spans both hardware and software, the problem
is more prevalent with software. In fact software vulnerabilities
can be put into four categories:
Operating system vulnerabilities .
Port-based vulnerabilities (Enhance system security by blocking those known
ports at the firewall).
 Application software based errors .
 System protocol software such as client and server browser .
• The most frequently mentioned sources of security vulnerability
problems in computer networks are :
• design flaws,
• poor security management,
• incorrect implementation,
• Internet technology vulnerability,
• the difficulty of fixing vulnerable systems,
• social Engineering
• Where do vulnerabilities come from?
• Flaws in software .
• Faulty configuration .
• Weak passwords .
• Human error .
Vulnerabilities in Systems
• System vulnerabilities are weaknesses in the software or hardware on a server
or a client that can be exploited by a determined intruder to gain access to or
shut down a network.
• How do viruses, rootkits enter a system?
• Even without the user doing something “stupid” .
• There are vulnerabilities in most software systems .
• Buffer Overflow is the most dangerous and common one .
If you remember only one thing from this course:
A vulnerability that is will be found “too complicated for
anyone to ever find”!
Thank you
With best wishes

Security vulnerability

  • 1.
  • 2.
    Vulnerability • A flawor weakness in system security (procedures, design, implementation, or internal controls) that may result in a security breach or a violation of the system's security policy. Briefly vulnerability Is a point where a system is susceptible to attack.
  • 3.
    • Internet technologyhas been and continues to be vulnerable. There have been reports of all sorts of loop holes, weaknesses, and gaping holes in both software and hardware technologies. • No one knows how many of these vulnerabilities there are both in software and hardware. The assumption is that there are thousands. As history has shown us, a few are always discovered every day by hackers . Internet Technology Vulnerability
  • 4.
    • Although thelist spans both hardware and software, the problem is more prevalent with software. In fact software vulnerabilities can be put into four categories: Operating system vulnerabilities . Port-based vulnerabilities (Enhance system security by blocking those known ports at the firewall).  Application software based errors .  System protocol software such as client and server browser .
  • 5.
    • The mostfrequently mentioned sources of security vulnerability problems in computer networks are : • design flaws, • poor security management, • incorrect implementation, • Internet technology vulnerability, • the difficulty of fixing vulnerable systems, • social Engineering
  • 6.
    • Where dovulnerabilities come from? • Flaws in software . • Faulty configuration . • Weak passwords . • Human error .
  • 7.
    Vulnerabilities in Systems •System vulnerabilities are weaknesses in the software or hardware on a server or a client that can be exploited by a determined intruder to gain access to or shut down a network.
  • 8.
    • How doviruses, rootkits enter a system? • Even without the user doing something “stupid” . • There are vulnerabilities in most software systems . • Buffer Overflow is the most dangerous and common one .
  • 9.
    If you rememberonly one thing from this course: A vulnerability that is will be found “too complicated for anyone to ever find”!
  • 10.