Access Millions of academic & study documents

Malware

Content type
User Generated
Subject
Computer Science
Type
Homework
Showing Page:
1/10
Running head: SOFTWARE VULNERABILITIES AND MALWARE 1
Software Vulnerabilities and Malware
Institutional Affiliation
Date

Sign up to view the full document!

lock_open Sign Up
Showing Page:
2/10
SOFTWARE VULNERABILITIES AND MALWARE
2
Contents
Introduction .......................................................................................................................................3
Literature review ................................................................................................................................3
Software vulnerabilities...................................................................................................................3
Buffer overflow ...........................................................................................................................3
Race condition ............................................................................................................................4
Access control vulnerabilities...........................................................................................................4
Broken access control ..................................................................................................................4
Cross-site scripting (XXS) flaws .....................................................................................................4
Malware.........................................................................................................................................5
Trojan .........................................................................................................................................5
Virus ...........................................................................................................................................5
Methodology......................................................................................................................................5
FINDINGS ...........................................................................................................................................5
The case studies/incidence reports ..................................................................................................5
Buffer overflow attacks................................................................................................................5
Broken access control ..................................................................................................................6
Cross-site scripting (XXS) flaws .....................................................................................................6
Trojan .........................................................................................................................................6
Virus ...........................................................................................................................................7
Negative impacts of the vulnerabilities and malware ........................................................................7
Buffer overflow attacks................................................................................................................7
Broken access control ..................................................................................................................7
Cross-site scripting control ...........................................................................................................8
Trojan .........................................................................................................................................8
Virus ...........................................................................................................................................8
Conclusion and recommendations .......................................................................................................8
References ....................................................................................................................................... 10

Sign up to view the full document!

lock_open Sign Up
Showing Page:
3/10

Sign up to view the full document!

lock_open Sign Up
End of Preview - Want to read all 10 pages?
Access Now
Unformatted Attachment Preview
Running head: SOFTWARE VULNERABILITIES AND MALWARE Software Vulnerabilities and Malware Institutional Affiliation Date 1 SOFTWARE VULNERABILITIES AND MALWARE 2 Contents Introduction .................................................................................................................................................. 3 Literature review........................................................................................................................................... 3 Software vulnerabilities ............................................................................................................................ 3 Buffer overflow ..................................................................................................................................... 3 Race condition ...................................................................................................................................... 4 Access control vulnerabilities ................................................................................................................... 4 Broken access control ........................................................................................................................... 4 Cross-site scripting (XXS) flaws ............................................................................................................. 4 Malware .................................................................................................. ...
Purchase document to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Studypool
4.7
Indeed
4.5
Sitejabber
4.4