Malicious -2
Network-based attack from the Internet
- Denial of service, root compromise
- Ex. Ping-of-death, Solaris ingreslock exploits
- We maintain firewall, monitor lists, apply patches at first availability from the vendors
- You should install current, supported software versions and maintain software with new updates and monitor lists for security fixes
- Use SCS maintained systems and file systems