Hosts are weak
When not weak due to bugs, are often weakly configured
Too much exposed code
Programs are written unsafely
Programs run with too much privilege
… in short there are too many ways to successfully attack hosts that can then be used to attack others.
Previous slide
Next slide
Back to first slide
View graphic version