Section 2

License

THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.

Explain Better

Types of Security issues

DATA
======

Its very simple, they just want your system data.
  • Steel
  • Corrupt
  • Remove
  • Software-Apps
    ======

    If target data cant be touched, next target is Applications
  • Apache server
  • Database (SQL,Orcale etc)
  • Any other applications
  • Operating System
    ======

    Host is next target...
  • File Coraptions
  • Complite shutdown
  • Process Managent(CPU RAM)
  • HARDWARE
    ======

    Last target is hardware.
  • Attack CPU, RAM, external connected devices
  • Disable, remove, corrupt them^
  • <~~ || -->