Hardware Vulnerabilities:
Hardware is more visible than software, largely because it is composed of physical objects. Because we can see what devices are hooked to the system, it is rather simple to attack by adding devices, changing them, removing them, intercepting the traffic to them or flooding them with traffic until they can go longer function. However, designers can usually put safeguards in place.
In particular deliberate attacks on equipment, intending to limit availability, usually involve theft or destruction. Managers of major computing centers long ago recognized these vulnerabilities and installed physical security systems to protect their machines.
Software Vulnerabilities:
Computing equipment is of little use without the software that users expect. Software can be replaced, changed, or destroyed maliciously, or it can be modified, deleted, or misplaced accidentally. Whether intentional or not, these attacks exploit the software vulnerabilities.
No comments:
Post a Comment