Hacking (computer Security) - Attacks

Attacks

Computer security
  • Secure operating systems
  • Security by design
  • Secure coding
Computer insecurity
  • Vulnerability
    • Eavesdropping
  • Exploits
    • Trojans
    • Viruses and worms
    • Denial of service
  • Payloads
    • Rootkits
    • Keyloggers

A typical approach in an attack on Internet-connected system is:

  1. Network enumeration: Discovering information about the intended target.
  2. Vulnerability analysis: Identifying potential ways of attack.
  3. Exploitation: Attempting to compromise the system by employing the vulnerabilities found through the vulnerability analysis.

In order to do so, there are several recurring tools of the trade and techniques used by computer criminals and security experts.

Read more about this topic:  Hacking (computer Security)

Famous quotes containing the word attacks:

    Stupidity is something unshakable; nothing attacks it without breaking itself against it; it is of the nature of granite, hard and resistant.
    Gustave Flaubert (1821–1880)

    Neither the wrath of Heaven nor the attacks of enemies
    are as fatal as Pleasure alone when she infects the mind.
    Silius Italicus (26–101)

    Under peaceful conditions, the warlike man attacks himself.
    Friedrich Nietzsche (1844–1900)