Google

Wednesday, October 24, 2007

Mobile working Toolkit

Mobile working Toolkit
Malicious Websites

Did you find this whitepaper useful?
Publisher
Perimeter eSecurity
Publisher Registration
N/A
Topics
Network Security, Security Standards, Security Management, Intrusion Detection Systems, Best Practices
Date added
24 Oct 2007
Downloads
0
Format
PDF -->
Publishers' Description
2005 saw the beginning of a movement towards an entirely new type of attack method. Until then, most attackers would compromise a computer system by simply attacking it with known vulnerabilities or "bugs" that could allow the attacker to gain some level of control over the system. These are commonly referred to as "inbound attacks." With personal firewalls loaded onto many systems, as well as other security features enabled, the "inbound attack" approach became increasingly less profitable. New attack methods started being seen where the attacker would take advantage of vulnerabilities within the Internet browser itself. These vulnerabilities would allow the attacker to download malicious code, Trojan horses, or other applications in the background simply by having the user look at a web page. This white paper explores and provides solutions for many of the security threats that are part of today's Internet environment.

No comments: