File:Windows NT threats and vulnerabilities (IA windowsntthreats00moor).pdf

From Wikimedia Commons, the free media repository
Jump to navigation Jump to search
Go to page
next page →
next page →
next page →

Original file(1,172 × 1,579 pixels, file size: 3.69 MB, MIME type: application/pdf, 84 pages)

Captions

Captions

Add a one-line explanation of what this file represents

Summary[edit]

Windows NT threats and vulnerabilities   (Wikidata search (Cirrus search) Wikidata query (SPARQL)  Create new Wikidata item based on this file)
Author
Moore, Febbie P
image of artwork listed in title parameter on this page
Title
Windows NT threats and vulnerabilities
Publisher
Monterey, Calif. : Naval Postgraduate School ; Springfield, Va. : Available from National Technical Information Service
Description
"September 1997."
Thesis advisor(s): Norman Schneidewind, Douglas Brinkley
Thesis (M.S. in Information Technology Management)--Naval Postgraduate School, September. 1997
Includes bibliographical references (p. 47)
The objective of this research is to examine the threats and vulnerabilities of a Windows NT network. One aspect of this research is to add to the Department of Defense's understanding of the disadvantages of the system. This research demonstrates five vulnerabilities of Windows NT with respect to the military network operating system security environment. First, there is the NetBIOS-over-TCP)IP vulnerability. Windows NT by default allows networking over this protocol. This protocol could allow an attacker to remotely connect to a drive and edit the registry. Second, the server message block (SMB) vulnerability allows remote access to shared directories. An unauthorized user could use this hole to access everything on the shared resources. Third, the remote registry access vulnerability could allow an attacker to view and change the contents of another computer's Registry. Fourth, improperly set permissions could allow unauthorized access to sensitive and classified data. Fifth, the built-in file transfer protocol (H?) service allows users to change directories. Users could use this hole to sec the root directory. Before DOD becomes too committed to Windows NT, these issues need to be addressed
Mode of access: World Wide Web
System requirements: Adobe Acrobat reader

Subjects:
Language English
Publication date 1 September 1997, 00:00:00
Current location
IA Collections: navalpostgraduateschoollibrary; fedlink; americana
Accession number
windowsntthreats00moor
Authority file  OCLC: 1102333145
Source
Internet Archive identifier: windowsntthreats00moor
https://archive.org/download/windowsntthreats00moor/windowsntthreats00moor.pdf

Licensing[edit]

Public domain
This work is in the public domain in the United States because it is a work prepared by an officer or employee of the United States Government as part of that person’s official duties under the terms of Title 17, Chapter 1, Section 105 of the US Code. Note: This only applies to original works of the Federal Government and not to the work of any individual U.S. state, territory, commonwealth, county, municipality, or any other subdivision. This template also does not apply to postage stamp designs published by the United States Postal Service since 1978. (See § 313.6(C)(1) of Compendium of U.S. Copyright Office Practices). It also does not apply to certain US coins; see The US Mint Terms of Use.

File history

Click on a date/time to view the file as it appeared at that time.

Date/TimeThumbnailDimensionsUserComment
current01:06, 26 July 2020Thumbnail for version as of 01:06, 26 July 20201,172 × 1,579, 84 pages (3.69 MB) (talk | contribs)FEDLINK - United States Federal Collection windowsntthreats00moor (User talk:Fæ/IA books#Fork8) (batch 1993-2020 #32434)

Metadata