Security

Previous Topic Next Topic

Attacks

An attack takes advantage of an existing vulnerability. For example, suppose a malicious user knows that some users have weak passwords and tries guessing them until gaining access to restricted resources.


© 1997-1999 Microsoft Corporation. All rights reserved.