POST: The
attack surface of a software environment is the
sum of the different points (the "attack vectors") where an
unauthorized user (the "attacker") can try to
enter data to or
extract data from an environment.
what is available to be used by an attacker against the product itself.
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhHiVeDoqvJdQ5oUoU8UilRPM5taW1ylxVC4tkKnwtnh3Qt-yql38gxCmLNIAnUy49iWa5kBwNzCQ6hx6L7fknJMgV0cdjODTdDhznk3ebn5u9r7EoJl3OBveC917hceupFbICfrf1baw/s1600/reducing-attack-surface-control-with-endpoint-control_5029165fc1e2f_w560.png)
||
No comments:
Post a Comment
You will get Reply with in 24 hours