Pages

Sunday, March 6, 2011

Levels of Security violations

Violation type# 1: Curiosity

A curious person who wants to just know some of the details about you like phone number or your salary, and He may be internal or external. I am sure you guys won’t want this to happen with you. So, curiosity is one of the possible violations.

Violation type# 2: Ethical Hacking

Second possibility is, a person telling himself an ethical person wants to thumbs you down by executing some tricks on the production environment. Even though he is not interested in you or in your money and will help you to fix the vulnerability but he is still dangerous to you because he is executing his tricks on your production environment. So, ethical hacking is another possible violation.

Violation type# 3: Serious Hacking

The third possibility is about serious hacking, where their main intention is to break your application, steal our money, and do all types of illegal activities.

The threat never stops here,

Violation type# 4: By user/ By some typo error

The fourth level of security violation may come none other than from yourself and you yourselves may become a potential threat to your application. How means, you may be the cause due to typo error like “$” insert which in turn may be compiled as a shell command.

No comments:

Post a Comment