List the configuration options available for updating the os

Table 1: Important Security Terms An unchecked buffer in a program that can overwrite the program code with new data.If the program code is overwritten with new executable code, the effect is to change the program's operation as dictated by the attacker.The purpose of this module is to introduce the key issues for update management in a Microsoft Windows operating system—based environment, and to describe the main tools, technologies, and processes that Microsoft recommends to support this task.

Table 3 lists the ratings used by MSRC to categorize the severity of a vulnerability.Once installed, the Spyware monitors user activity on the Internet and transmits that information in the background to someone else.Spyware can also gather information about e-mail addresses and even passwords and credit card numbers.Directed attacks can be carried out locally or remotely, and can include an exhaustive search for one of many possible vulnerabilities, including software vulnerabilities, weak passwords, weak security configurations, and security policy or training vulnerabilities.Microsoft is committed to protecting customers from security vulnerabilities.

Leave a Reply