Attacks
Computer security | |
---|---|
Secure operating systems | |
Security by design | |
Secure coding | |
Computer insecurity | |
Vulnerability | Eavesdropping |
Exploits | Trojans Viruses and worms Denial of service |
Payloads | Rootkits Keyloggers |
A typical approach in an attack on Internet-connected system is:
- Network enumeration: Discovering information about the intended target.
- Vulnerability analysis: Identifying potential ways of attack.
- Exploitation: Attempting to compromise the system by employing the vulnerabilities found through the vulnerability analysis.
In order to do so, there are several recurring tools of the trade and techniques used by computer criminals and security experts.
Read more about this topic: Hacker (computer Security)
Famous quotes containing the word attacks:
“Leadership does not always wear the harness of compromise. Once and again one of those great influences which we call a Cause arises in the midst of a nation. Men of strenuous minds and high ideals come forward.... The attacks they sustain are more cruel than the collision of arms.... Friends desert and despise them.... They stand alone and oftentimes are made bitter by their isolation.... They are doing nothing less than defy public opinion, and shall they convert it by blows. Yes.”
—Woodrow Wilson (18561924)
“I must ... warn my readers that my attacks are directed against themselves, not against my stage figures.”
—George Bernard Shaw (18561950)
“I find that with me low spirits and feeble health come and go together. The last two or three months I have had frequent attacks of the blues. They generally are upon me or within me when I am somewhat out of order in bowels, throat, or head.”
—Rutherford Birchard Hayes (18221893)