The concept of a “Vulnerability”
•
Buffer overflow
•
Protocol/bandwidth interactions
–
Protocol elements which do no work
•
“execute this” messages
–
The special case of “mobile agents”
•
Human user vulnerabilities
–
eMail worms
–
Phishing