| Kind of Attack | Compromise | Vulnerability | Skill needed | Type of System | Additional Info | Protective Measures |
|---|---|---|---|---|---|---|
| denial of service | system resources | low bandwidth, insecure daemons | novice - expert | any | hard to evade completely, no security problem, selected victims only | bandwidth management, firewalls, periodical software updates / version management |
| local | other user data | weak passwords, permissions | novice | any | very possible to happen on big multi-user servers | software updates, administrative security |
| cgi I | system info, passwd | insecure cgi scripts , httpd , permissions | novice | any webservers | delivers information for more serious attacks, random victims | software updates, www security check |
| cgi II | wwwuser shell access, resources, sometimes root | insecure cgi scripts, weak passwords and security | average | unix webservers | caused by and creates serious security problems on webservers, random victims | software updates, periodical www security checks |
| trojan | sensitive data / passwords, root, access to other systems | inadequate security policy | novice / average | any | even possible without any technical vulnerabilities, both selected (social engineering) and random (via junk mail, posting, etc.) victims | security policies, application level gateways |
| remote root compromise | complete system, see above | insecure / obsolete daemons (remote overflows) | average | any unix, especially linux, bsd, sun, hpux, dgux | reinstallation is recommended after root compromises, mostly random victims | periodical software updates , version management and security auditing |
| sniffing / backlogging | credit cards / transaction data / software / access to other systems / databases | previous root compromise | average / expert | preferrably shell servers, isps, e-commerce servers | causes more serious damage the later it is noticed, selected victims only | security auditing, emergency actions |
| cgi III | root, database / user profiles( for spamming / carding ), webpages | obsolete cgi scripts, non-standard / self-written code | expert | preferrably e-commerce servers, domain / web providers, search engines, government sites | causes most serious damage, selected victims only | firewall solutions, www/cgi security auditings |