Where do the Risks Come From?
- Misconfigured services
- Bugs in system software
- Bugs in application software
- Backdoors
- Privileged information (passwords)
Lincoln D. Stein, lstein@cshl.org
Cold Spring Harbor Laboratory
Last modified: Sun Jul 16 18:16:42 PDT 2000