Taking a look at the attack vectors

Every attack that breaches the security of the system or takes it down, exploits either one or the other vulnerability of the system the application is running on. These vulnerabilities differ for every kind of application. An application that has been built natively for a system may have different attack vectors than an application that has been developed for the web.

To adequately protect the application against attacks, we need to understand the different attack vectors that are used against the different application types.

For here onwards, we will take a brief look at two of the most common application types and the attack vectors that may be used to target those applications.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.144.91.47