Controlling the uncontrollable user

A large percentage of computer security problems have origins in a common issue: end-users installing or running programs without administrative approval and control. Outside of buffer overflows and social engineering attacks, most exploits occur because users inadvertently install unauthorized malware or other programs. Many times, the programs are malicious in nature from the start, such as viruses, worms, Trojans, and spyware; but others are legitimate programs that allow new types of exploits to happen.

Linked by shanmuga Saturday, 10th December 2005 1:39AM