How do you discover vulnerabilities in information systems? Think
How do you discover vulnerabilities in

Exploiters on the Internet have caused billions of dollars in damage. These exploiters are intelligent cyber terrorists, criminals and hackers who have a plethora of tools available in their war chests ranging from spyware, rootkits, Trojans, viruses, worms, bots, and zombies to various other blended threats.
Exploits can be grown and harvested the same day a security hole is announced—in so-called "zero-day attacks"—so they are getting much harder to stop. Open-source malware code, freely available on the Internet, is enabling this phenomenon and cannot be reversed. Although the number and types of exploits "in the wild" continue to rise exponentially, there are fewer than a dozen core methodologies used for their execution and proliferation. Most exploits can be removed, but some exist indefinitely and can be destroyed or removed only by loss of data—you’ve probably heard of these "rootkits." Most exploits will reinfect a host if a security hole, also known as the Common Vulnerability and Exposure (CVE), is not removed.
Many exploiters are doing it for profit. Just take a look here and you’ll see where the US$10 billion in identity theft last year occurred the most.
Not all exploits are created equal. Most are evolutionary improvements on existing exploits. What’s very interesting is that the average exploit currently has a dozen names. With the advent of the Common Malware Enumeration (CME) standard, there will be one shared, neutral indexing capability for malware but that will take years—probably more than five years, like the CVE standard that is just starting to catch on, since its inception in 1999 by Mitre, now funded by the U.S. Department of Homeland Security. It is crucial today to prevent vulnerabilities across the enterprise and remove these CVEs—these security holes in your desktops, laptops and servers. Knowing what they are, where they are on your network, and how to remove them is more important than sniffing packets and listening for burglars.
Step by step
Solved in 2 steps









