Hacker (computer Security) - Attacks

Attacks

Computer security
Secure operating systems
Security by design
Secure coding
Computer insecurity
Vulnerability Eavesdropping
Exploits Trojans
Viruses and worms
Denial of service
Payloads Rootkits
Keyloggers

A typical approach in an attack on Internet-connected system is:

  1. Network enumeration: Discovering information about the intended target.
  2. Vulnerability analysis: Identifying potential ways of attack.
  3. Exploitation: Attempting to compromise the system by employing the vulnerabilities found through the vulnerability analysis.

In order to do so, there are several recurring tools of the trade and techniques used by computer criminals and security experts.

Read more about this topic:  Hacker (computer Security)

Famous quotes containing the word attacks:

    Stupidity is something unshakable; nothing attacks it without breaking itself against it; it is of the nature of granite, hard and resistant.
    Gustave Flaubert (1821–1880)

    The gray glaze of the past attacks all know-how....
    John Ashbery (b. 1927)

    Neither the wrath of Heaven nor the attacks of enemies
    are as fatal as Pleasure alone when she infects the mind.
    Silius Italicus (26–101)