The objective of this article is to identify the core issues around a digital intrusion. What are the key elements in Digital Intrusion? What is the impact on the enterprise? How do you classify the Intruders? How do you categorize your Assets?
Latest CERT reports a total of 5990[1] vulnerabilities for the year 2005 an increase of 58.5% from the year 2004 and a 3402% increase from the year 1995. Usually vulnerability in an application is due to un-identified bug in the code. However there are times when backdoors written explicitly in some application to get into a users machine.
[1] 2005 Vulnerability List http://www.cert.org/stats/cert_stats.html
No comments:
Post a Comment