Attacks
Computer security | |
---|---|
Secure operating systems | |
Security by design | |
Secure coding | |
Computer insecurity | |
Vulnerability | Eavesdropping |
Exploits | Trojans Viruses and worms Denial of service |
Payloads | Rootkits Keyloggers |
A typical approach in an attack on Internet-connected system is:
- Network enumeration: Discovering information about the intended target.
- Vulnerability analysis: Identifying potential ways of attack.
- Exploitation: Attempting to compromise the system by employing the vulnerabilities found through the vulnerability analysis.
In order to do so, there are several recurring tools of the trade and techniques used by computer criminals and security experts.
Read more about this topic: Hacker (computer Security)
Famous quotes containing the word attacks:
“Stupidity is something unshakable; nothing attacks it without breaking itself against it; it is of the nature of granite, hard and resistant.”
—Gustave Flaubert (18211880)
“We are supposed to be the children of Seth; but Seth is too much of an effete nonentity to deserve ancestral regard. No, we are the sons of Cain, and with violence can be associated the attacks on sound, stone, wood and metal that produced civilisation.”
—Anthony Burgess (b. 1917)
“I must ... warn my readers that my attacks are directed against themselves, not against my stage figures.”
—George Bernard Shaw (18561950)