Points the attacker can target
As mentioned, the vulnerability of a system exists at the entry and exit points within the system. Figure 3 shows an e-Commerce system with several points that the attacker can target:
- Shopper
- Shopper' computer
- Network connection between shopper and Web site's server
- Web site's server
- Software vendor
Figure 3. Points the attacker can target
These target points and their exploits are explored later in this article.
No comments:
Post a Comment