Where do the Risks Come From?

  1. Misconfigured services
  2. Bugs in system software
  3. Bugs in application software
  4. Backdoors
  5. Privileged information (passwords)


<< Previous Contents >> Next >>

Lincoln D. Stein, lstein@cshl.org
Cold Spring Harbor Laboratory
Last modified: Sun Jul 16 18:16:42 PDT 2000