Security Holes
Made by flaws in network software that permit unintended access to the network
- A bug that permits unauthorized access
- Operating systems often contain security holes
- Details can be highly technical
Once discovered, knowledge about the security hole quickly circulated on the Internet
- A race can then begin between
- Hackers attempting to break into networks through the security hole and
- Security teams working to produce a patch to eliminate the security hole
- CERT: major clearing house for Internet related holes