Vulnerability (computing) - Identifying and Removing Vulnerabilities

Identifying and Removing Vulnerabilities

Many software tools exist that can aid in the discovery (and sometimes removal) of vulnerabilities in a computer system. Though these tools can provide an auditor with a good overview of possible vulnerabilities present, they can not replace human judgment. Relying solely on scanners will yield false positives and a limited-scope view of the problems present in the system.

Vulnerabilities have been found in every major operating system including Windows, Mac OS, various forms of Unix and Linux, OpenVMS, and others. The only way to reduce the chance of a vulnerability being used against a system is through constant vigilance, including careful system maintenance (e.g. applying software patches), best practices in deployment (e.g. the use of firewalls and access controls) and auditing (both during development and throughout the deployment lifecycle).

Read more about this topic:  Vulnerability (computing)

Famous quotes containing the word identifying:

    And the serial continues:
    Pain, expiation, delight, more pain,
    A frieze that lengthens continually, in the lucky way
    Friezes do, and no plot is produced,
    Nothing you could hang an identifying question on.
    John Ashbery (b. 1927)