The SANS Top 20 Internet Security Vulnerabilities

(SANS) "The vast majority of worms and other successful cyber attacks are made possible by vulnerabilities in a small number of common operating system services. Attackers are opportunistic. They take the easiest and most convenient route and exploit the best-known flaws with the most effective and widely available attack tools. They count on organizations not fixing the problems, and they often attack indiscriminately, scanning the Internet for any vulnerable systems. The easy and destructive spread of worms, such as Blaster, Slammer, and Code Red, can be traced directly to exploitation of unpatched vulnerabilities." Mehr Information bei SANS. Die deutsche Übersetzung "Die SANS Top 20 Internet-Schwachstellen" finden Sie ebenfalls auf der Seite in der rechten Spalte unter "Top 20 Translations".