Hacker (computer Security) - Attacks

Attacks

Computer security
Secure operating systems
Security by design
Secure coding
Computer insecurity
Vulnerability Eavesdropping
Exploits Trojans
Viruses and worms
Denial of service
Payloads Rootkits
Keyloggers

A typical approach in an attack on Internet-connected system is:

  1. Network enumeration: Discovering information about the intended target.
  2. Vulnerability analysis: Identifying potential ways of attack.
  3. Exploitation: Attempting to compromise the system by employing the vulnerabilities found through the vulnerability analysis.

In order to do so, there are several recurring tools of the trade and techniques used by computer criminals and security experts.

Read more about this topic:  Hacker (computer Security)

Famous quotes containing the word attacks:

    Under peaceful conditions, the warlike man attacks himself.
    Friedrich Nietzsche (1844–1900)

    Stupidity is something unshakable; nothing attacks it without breaking itself against it; it is of the nature of granite, hard and resistant.
    Gustave Flaubert (1821–1880)

    The rebel, unlike the revolutionary, does not attempt to undermine the social order as a whole. The rebel attacks the tyrant; the revolutionary attacks tyranny. I grant that there are rebels who regard all governments as tyrannical; nonetheless, it is abuses that they condemn, not power itself. Revolutionaries, on the other hand, are convinced that the evil does not lie in the excesses of the constituted order but in order itself. The difference, it seems to me, is considerable.
    Octavio Paz (b. 1914)