In the present article demonstrates and documents a concrete example that uses the actions of techniques Drive-by-Download, Drive-by-Update, scripting, and the use of exploits to operate and infect a victim system, describing also several extra features that expose an attack by such actions and the damage malware can have. This type of attack is classified according to the timing vulnerabilities introduced in the software life cycle.
Classically, are raised six phases and are recognition, Feasibility study, Requirements, Design, Implementation, Integration and Testing. Initially it was considered the operation and maintenance as additional phase.
© 2001-2024 Fundación Dialnet · Todos los derechos reservados