Q:
What are the ways in which attackers can infiltrate the system?
Answer
- Web servers can be infiltrated using the command shell by an attacker to read the HTML files that is getting transferred.
- If the set-uid scripts are not proper and bad then the infiltration can happen by the attacker.
- The processes are not given proper permissions so that the password can be changed by using the “passwd” command to change the password of the system.
- This also authenticates the user for accessing the system and the files on it containing the data.
- The program that is used in the operating system doesn’t follow the principle of least privilege and lead to security issues.
View answer
Workspace
Report Error
Discuss