Q:
         
         
            
               What are the ways in which attackers can infiltrate the system?
            
                      
         
             Answer
                        - Web servers can be infiltrated using the command shell by an attacker to read the HTML files that is getting transferred. 
- If the set-uid scripts are not proper and bad then the infiltration can happen by the attacker. 
- The processes are not given proper permissions so that the password can be changed by using the “passwd” command to change the password of the system.
- This also authenticates the user for accessing the system and the files on it containing the data. 
- The program that is used in the operating system doesn’t follow the principle of least privilege and lead to security issues.
          
         
         
         
             View answer
             Workspace
             Report Error
             Discuss