Once you can see how people can hack into your computerās security system, you will Be able to figure out what an attacker might want to target on your computer. If you don't know Different vulnerabilities on most computer systems, you can find information about vulnerabilities Database such as 1. US-CERT Vulnerability Description Database ( kb.cert.org ) 2. Common vulnerabilities and exposures ( cve.mitre.org/cve ) 3. NIST National Vulnerability Database ( nvd.nist.gov ) These websites document all known system vulnerabilities, which will enable you to make the right assessment for your system. Once you are making the assessment, you can use different tools to administer vulnerability management. Depending on what vulnerabilities that you managed to find, you can use the information you found about the system and identify what attack is most likely to happen. These attacks can be done to do the following: 1. Take a screenshot while opening a confidential fil...
Network Security and Hacking