Seven Lesser-Known System Attacks and How to Defeat Them
Too often, businesses and enterprises focus on the dangers that get the most press and forget that there are plenty of other ways they can be hurt. This paper outlines some of the lesser-known attacks that a business can face and points out ways to defend against them. When one thinks of the types of vulnerabilities that an attacker can use to enter a system, several common types of attacks come to mind, such as those that exploit buffer overflows, weak passwords, or even configuration issues. This paper explores some of the other kinds of attacks that are out there and how one can detect and defeat them.