Page 1497 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1497

Summary


               Applications developers have a lot to worry about! As hackers become
               more sophisticated in their tools and techniques, the Application layer
               is increasingly becoming the focus of their attacks due to its

               complexity and multiple points of vulnerability.

               Malicious code, including viruses, worms, Trojan horses, and logic
               bombs, exploits vulnerabilities in applications and operating systems
               or uses social engineering to infect systems and gain access to their
               resources and confidential information.

               Applications themselves also may contain a number of vulnerabilities.

               Buffer overflow attacks exploit code that lacks proper input validation
               to affect the contents of a system’s memory. Back doors provide
               former developers and malicious code authors with the ability to
               bypass normal security mechanisms. Rootkits provide attackers with
               an easy way to conduct escalation-of-privilege attacks.

               Many applications are moving to the web, creating a new level of
               exposure and vulnerability. Cross-site scripting attacks allow hackers

               to trick users into providing sensitive information to unsecure sites.
               SQL injection attacks allow the bypassing of application controls to
               directly access and manipulate the underlying database.

               Reconnaissance tools provide attackers with automated tools they can
               use to identify vulnerable systems that may be attacked at a later date.
               IP probes, port scans, and vulnerability scans are all automated ways
               to detect weak points in an organization’s security controls.

               Masquerading attacks use stealth techniques to allow the
               impersonation of users and systems.
   1492   1493   1494   1495   1496   1497   1498   1499   1500   1501   1502