What is a Blended Threat ?
May 22, 2010Any threat that uses multiple means of propagation
AND requires an integrated response from more than one technology
Discovering Vulnerabilities
How vulnerabilities are discovered:
By accident or chance
Browsing through CVS entries, software development, bug databases, or change logs
Using source code scanning tools
ITS4, Flawfinder, or RATS
Utilizing vulnerability scanners
Manually analyzing software code or hardware
Exploiting Vulnerabilities
Why are the bad guys able to exploit vulnerabilities so quickly?
Most software is insecure and full of vulnerabilities
Due to poor software coding processes, lack of training, etc.
Vendors don’t typically patch vulnerabilities quick enough
Customers/Consumers don’t apply patches quickly enough
Many vulnerabilities have multiple attack vectors
www.bestitdocuments.com