Suppose you operate an Apache-based Linux Web server that hosts your company's e-commerce site. Suppose further that
Fantastic news! We've Found the answer you've been seeking!
Question:
Suppose you operate an Apache-based Linux Web server that hosts your company's e-commerce site. Suppose further that there is a worm called "WorminatorX," which exploits a (fictional) buffer overflow bug in the Apache Web server package that can result in a remote root compromise.
Construct a simple threat model that describes the risk this worm represents: attacker(s), attack-vector, vulnerability, assets, likelihood of occurrence, likely impact, and plausible mitigations.
Related Book For
Principles of Information Security
ISBN: 978-1285448367
4th Edition
Authors: Michael E. Whitman, Herbert J. Mattord
Posted Date: