1,322
12
Research Paper, 1 pages (200 words)

Developments in hacking, cybercrime, and malware

The attacker can then execute malicious tiles installed by the initial security weakness. Also, an attacker can exploit this vulnerability by enticing a victim to open a malicious Web page. A successful attack will allow an attacker to execute remote code on a victims computer, This vulnerability may be appealing to attackers because, rather than relying on a plug-in that may or may not be installed on a target computer; it relies only on the use of a version of a popular browser, thereby increasing the number of potential victims.

Cisco response to MAD collisions In certificates Issued by vulnerable certificate authorities Is Its release of the Cisco Adaptive Security Appliance (AS) and ISO may tooth serve as certificate authorities and by default use the MAD hashing algorithm In the digital signatures of certificates issued to end users and devices The hashing algorithm used In digital certificates on the Cisco AS cannot be changed; however, the AS Is unlikely to be affected by the attacks described In this research due to the way certificates are generated on the device.

Cisco recognizes the weaknesses in MAD and plans to alter the signature algorithm used in digital certificates and modify the methods utilized in creation of CA and endpoint certificates.

Thank's for Your Vote!
Developments in hacking, cybercrime, and malware. Page 1
Developments in hacking, cybercrime, and malware. Page 2

This work, titled "Developments in hacking, cybercrime, and malware" was written and willingly shared by a fellow student. This sample can be utilized as a research and reference resource to aid in the writing of your own work. Any use of the work that does not include an appropriate citation is banned.

If you are the owner of this work and don’t want it to be published on AssignBuster, request its removal.

Request Removal
Cite this Research Paper

References

AssignBuster. (2021) 'Developments in hacking, cybercrime, and malware'. 14 November.

Reference

AssignBuster. (2021, November 14). Developments in hacking, cybercrime, and malware. Retrieved from https://assignbuster.com/developments-in-hacking-cybercrime-and-malware/

References

AssignBuster. 2021. "Developments in hacking, cybercrime, and malware." November 14, 2021. https://assignbuster.com/developments-in-hacking-cybercrime-and-malware/.

1. AssignBuster. "Developments in hacking, cybercrime, and malware." November 14, 2021. https://assignbuster.com/developments-in-hacking-cybercrime-and-malware/.


Bibliography


AssignBuster. "Developments in hacking, cybercrime, and malware." November 14, 2021. https://assignbuster.com/developments-in-hacking-cybercrime-and-malware/.

Work Cited

"Developments in hacking, cybercrime, and malware." AssignBuster, 14 Nov. 2021, assignbuster.com/developments-in-hacking-cybercrime-and-malware/.

Get in Touch

Please, let us know if you have any ideas on improving Developments in hacking, cybercrime, and malware, or our service. We will be happy to hear what you think: [email protected]