In the faceless world of the Internet, a large number of generic security vulnerabilities
constitute one of the greatest reasons of loss for web merchants. These software bugs
can be found and exploited in server software, client applications and the operating system itself. Sometimes protocols are inherently flawed and therefore any application
making use of that specific protocol will be vulnerable (Velasco, 2003).
Unwanted attempts at accessing, manipulating, and/or disabling of computer
systems, mainly through a network, such as the Internet may take the form of attacks,
for example, by crackers, malware and/or disgruntled employees. These attempts include
network attacks against vulnerable services, data-driven attacks on applications, hostbased
attacks such as privilege escalation, unauthorized logins and access to sensitive
files and malware (viruses, trojan horses and worms).
|