This topic provides commonly used terms of Security Center.
Attackers may exploit the privilege escalation vulnerability to obtain the highest permissions and control the website server during attacks. Attackers may exploit this vulnerability to break through the security defense system, which threatens assets and data security.
Attackers may run malicious code on servers to attack or control the servers.
The common vulnerability scoring system (CVSS) is used to assess the severity of vulnerabilities.
A DDoS attack is a malicious attempt to attack one or more targets by using multiple compromised computer systems. This type of attack poses great threats to servers.
A web content management system (Web CMS) uses content repositories or databases to store page content, metadata, or other information assets that is required by a system.
Vulnerabilities refer to flaws in operating system implementation or security policies. The flaws include defects that exist in the design of operating system software or applications, and errors that occur during the development of the software or applications. Attackers can exploit vulnerabilities to access and steal the data on your servers or undermine the security of your servers. We recommend that you fix detected vulnerabilities at the earliest opportunity to protect your assets.
Baselines describe the minimum requirements for security practices and compliance checks. The baseline check feature checks various configurations of operating systems, databases, and middleware, such as the configurations for weak passwords, account permissions, identity authentication, password policies, access control, security audit, and intrusion prevention. Security Center can check baseline configurations for threats to ensure security. The threats include weak passwords, unauthorized access, vulnerabilities, and configuration risks. Security Center can also check baseline configurations against the standards for classified protection compliance or the Center for Internet Security (CIS) standards to ensure compliance. You can use Security Center to check baseline configurations for more than 30 common versions of operating systems and for more than 10 types of databases and middleware. This way, you can help your enterprise meet various compliance requirements.
A weak password is guessable or can be cracked by launching brute-force attacks. In most cases, a weak password has at least one of the following characteristics: The password contains less than eight characters. The password contains less than three types of characters. The password is found in the attacker's dictionary that is disclosed on the Internet or used by malicious software. A weak password is easy to crack. If attackers crack a weak password, the attackers can log on to the operating system, and then read and modify the website code. Note that weak passwords can cause your operating system and business to be vulnerable to attacks.