By Matthew Sarrel  |  Posted 2002-11-19 Print this article Print

I. The Vulnerabilities"> II. The Vulnerabilities

E-mail attachments E-mail must get through your firewall to be useful, so it is a favorite delivery method among attackers.

Open ports (network or TCP ports) Not securing your ports is like leaving the windows open on your house: Anyone with a ladder can enter.

Outdated software Many software updates patch security problems. The older the hole, the more attackers will know how to exploit it.

Persistent connection The longer youre online, the more time attackers have to find and compromise you.

Uninformed user One who engages in risky computing behavior, such as using infected disks or not changing default passwords.

Matthew Sarrel Matthew D. Sarrel, CISSP, is a network security,product development, and technical marketingconsultant based in New York City. He is also a gamereviewer and technical writer. To read his opinions on games please browse http://games.mattsarrel.com and for more general information on Matt, please see http://www.mattsarrel.com.

Submit a Comment

Loading Comments...
Manage your Newsletters: Login   Register My Newsletters

Rocket Fuel