preview

Nt1330 Unit 3

Decent Essays

Introduction Servers often contain sensitive data. Employee information, customer information, and proprietary business data are just a few examples of the types of sensitive data often secured on company servers. Thus, it is critical that servers are secure from infiltration and attack. One of the best ways to secure a server from attack is to maintain system updates and patches. Why should servers be secured? As stated above, servers contain sensitive data pertaining to businesses, their employees, and their customers; this makes server security a top priority. When servers aren’t kept secure, they become vulnerable to attack. For example: On April 4th of this year, Microsoft issued security bulletin MS15-034; this security bulletin explains a vulnerability that “could allow remote code execution if an attacker sends a specially crafted HTTP request to an affected Windows system.” Later, on June 9th, Microsoft issued another security bulletin, MS15-056; this security bulletin explains a vulnerability that “could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who …show more content…

According to Vaughan-Nichols (2015), researchers at a security company known as Qualys discovered a major security hole affecting Linux systems. Known as GHOST, the hole allows hackers to take remote control of a system running Linux without any system IDs or passwords. “This hole exists in any Linux system built with glibc-2.2... The security hole can be triggered by exploiting glibc’s gethostbyname functions. This function is used on almost all networked Linux computers when the computer is called on to access another networked computer…” In other words, GHOST puts Linux systems at serious risk for remote control by attackers because they have a way into the system through a common, frequently used command prompt and once they’re in, they don’t need security

Get Access