security

What is a Blended Threat ?

May 22, 2010

Any threat that uses multiple means of propagation

AND requires an integrated response from more than one technology

Discovering Vulnerabilities

How vulnerabilities are discovered:

By accident or chance

Browsing through CVS entries, software development, bug databases, or change logs

Using source code scanning tools

ITS4, Flawfinder, or RATS

Utilizing vulnerability scanners

Manually analyzing software code or hardware

Exploiting Vulnerabilities

Why are the bad guys able to exploit vulnerabilities so quickly?

Most software is insecure and full of vulnerabilities

Due to poor software coding processes, lack of training, etc.

Vendors don’t typically patch vulnerabilities quick enough

Customers/Consumers don’t apply patches quickly enough

Many vulnerabilities have multiple attack vectors

www.bestitdocuments.com