WARNING:
JavaScript is turned OFF. None of the links on this concept map will
work until it is reactivated.
If you need help turning JavaScript On, click here.
Cette carte de concepts créée avec IHMC CmapTools traite de: Server Processes, Config files by Administrators, Software Ports identified by numbers, Vulnerabilities can be caused by Deprecated Software Version, Well known security flaws require Software Patches, Lower Ports ( < 1024) divided into Higher Ports (>= 1024), Vulnerabilities can result in identity hijacking, Well known security flaws reported by Security Bulletins, Unknown Security Flaws identified by Intrusion Detection, identity hijacking of Host, Interfaces by Administrators, identity hijacking of Accounts, Well known security flaws reported by Software Vendor, Vulnerabilities can result in DOS attacks, numbers range from 1 to 65535, Vulnerabilities can be caused by Well known security flaws, Server Processes are maintained through Interfaces, Software Upgrades must comply with Customized Configurations, Daemons e.g. Telnet Daemon, Vulnerabilities can result in Unauthorized access, Server Processes are maintained through Config files