Jidaw Systems
(MASTERCOMPUTERS)


Top 20 Computer threats unveiled by SANS


Leading and respected IT security and research organization, the SANS Institute has just released its annual Top 20 list of Internet security vulnerabilities. The aim of the annual list is to provide organizations with a starting point and guide for addressing critical computer security issues. Which loopholes are the hackers and cyber vandals exploiting?

The Top 20 list is produced based on recommendations by leading security researchers and companies around the world. The Top 20 consists of two lists of 10: the 10 most commonly exploited vulnerabilities in Windows and the 10 most commonly exploited vulnerabilities in Unix and Linux. 

Topping the Windows list is Web servers and services, while the Unix list leads with BIND domain name systems. 

 

TOP 10 WINDOWS 


1. Web servers & services 
2. Workstation service 
3. Windows remote access services 
4. Microsoft SQL server 
5. Windows authentication 
6. Web browsers 
7. File-sharing applications 
8. LSAS 
9. E-mail programs 
10. Instant messaging 

 

TOP 10 UNIX/LINUX 


1. Bind domain name system 
2. Web server 
3. Authentication 
4. Version control systems 
5. Mail transport services 
6. Simple Network Management Protocol (SNMP) 
7. Open secure sockets layer (SSL) 
8. Misconfiguration of enterprise services 
9. Databases 
10. Kernel 

 

Each entry in the Top 20 mentions a category of software. The accompanying report gives details on the individual vulnerabilities and what you do to deal with these vulnerabilities.

Better and detailed information about vulnerabilities that are commonly exploited by virus writers and hackers helps organizations to protect themselves in a proactive manner rather than the usual fire-fighting.  But the list is also evidence that organizations still not giving computer security the serious attention it deserves, as according to the SANs institute, almost 60% of the loopholes listed this year were in the 2003 Top 20 list. 

 

The list is available on the SANS Web site at:

http://www.sans.org

 

 

For more IT Security  Resources, click here:

http://www.jidaw.com/itsolutions/security3.html  

 

More IT and Telecomm News

IT and Telecomm News

 

Your Guide to taking the Right IT Career Decisions

 

 

What Do you Have to Say? Post Your Comments about this content resource Here.

 

 

Comments

comments powered by Disqus

 


Girls in ICT Day Events and Activities

Read more

Self Worth, New Year

Read more

Students face the Reality

Read more

Securing Nigeria's Future through ICT: The Role of Youths 2

Read more

Girls in ICT Day Events and Activities

Read more

Level of OSS deployment and usage in Nigeria

Read more

Students face the Reality

Read more

Self Worth, New Year

Read more

DISRUPT THE STATUS QUO!

     
1.

Ideas are not enough. You must be action oriented to improve your future.

 

 
2.

Don't just think but act. You get results not only from thinking but from acting.

 

 
3.

You have ideas. You want to achieve. You want opportunity.

 

 
4.

But what are you still doing in your comfort zone? The comfort zone is a dangerous place.

 

 
5.

"I wanted to", "I was going to" cannot put on a light bulb, not to talk of moving you forward.

 

 
6.

Aren't you tired of hoping and criticizing? Stop defending status quo that locks you down.

 

 
7.

GO on the offensive now with IT Education and Empowerment.

 

 
8.

What is the use of ideas without action?

 

 
9.

Start becoming the achiever you deserve to be.

 

 
10.

MAKE SURE THERE IS NO STANDING ROOM FOR EXCUSES.