Naziv |
Probe System Files |
---|---|
Sažetak | An adversary obtains unauthorized information due to improperly protected files. If an application stores sensitive information in a file that is not protected by proper access control, then an adversary can access the file and search for sensitive information. |
Preduvjeti | An adversary has access to the file system of a system. |
Rješenja | Verify that files have proper access controls set, and reduce the storage of sensitive information to only what is necessary. |