Search


PDF Archive search engine
Last database update: 17 May at 11:24 - Around 76000 files indexed.


Show results per page

Results for «misconfigurations»:


Total: 5 results - 0.007 seconds

HP Cyber Risk Report 2015 Infographic 100%

Attackers Focusing on Older Vulnerabilities 8227 days from launch of first Windows version affected by CVE-2014-4114 (“Sandworm”) vulnerability to release of the patch - April 16, 1992 to October 14, 2014 33% of all exploit samples discovered Top Exploits Discovered in 2014 in 2014 used an infection vector first detected in use in 2010, in Stuxnet CVE-2010-2568 CVE-2010-0188 CVE-2013-2422 59 22% CVE-2012-1723 33% 33% CVE-2012-0507 2% CVE-2012-0158 2% CVE-2013-2465 3% CVE-2012-4681 3% combined maximum age, in years, of the code in the high-profile Heartbleed, Shellshock, and POODLE zero-days 4% 4% 7% 9% CVE-2013-2423 7 of the top 10 exploits found overall in 2014 CVE-2009-3129 11% Others targeted vulnerabilities over 2 years old Server Misconfigurations Top Vulnerability List 2013 80% 68% 60% 60% 58% 40% 53% VS.

https://www.pdf-archive.com/2015/03/16/hp-cyber-risk-report-2015-infographic/

16/03/2015 www.pdf-archive.com

Web Application Penetration Test 95%

● Security​ ​Misconfiguration​ ​-​ ​There​ ​are​ ​security​ ​misconfigurations​ ​that​ ​may​ ​expose​ ​the application​ ​to​ ​increased​ ​risk.

https://www.pdf-archive.com/2017/11/29/web-application-penetration-test/

29/11/2017 www.pdf-archive.com

HP Cyber Risk Report 2015 Executive Summary 94%

The environment is one in which well-known attacks and misconfigurations exist side-by-side with mobile malware and connected devices (Internet of Things [IoT]) that remain largely unsecured.

https://www.pdf-archive.com/2015/03/16/hp-cyber-risk-report-2015-executive-summary/

16/03/2015 www.pdf-archive.com

HP Cyber Risk Report 2015 92%

Misconfigurations are still a problem The HP Cyber Risk Report 2013 documented how many vulnerabilities reported were related to server misconfiguration.

https://www.pdf-archive.com/2015/03/16/hp-cyber-risk-report-2015/

16/03/2015 www.pdf-archive.com

Cloud System Security 60%

Cloud Infrastructure: Physical Architecture - - Data centre:

https://www.pdf-archive.com/2018/02/21/cloud-system-security/

21/02/2018 www.pdf-archive.com