Attacks
Computer security | |
---|---|
Secure operating systems | |
Security by design | |
Secure coding | |
Computer insecurity | |
Vulnerability | Eavesdropping |
Exploits | Trojans Viruses and worms Denial of service |
Payloads | Rootkits Keyloggers |
A typical approach in an attack on Internet-connected system is:
- Network enumeration: Discovering information about the intended target.
- Vulnerability analysis: Identifying potential ways of attack.
- Exploitation: Attempting to compromise the system by employing the vulnerabilities found through the vulnerability analysis.
In order to do so, there are several recurring tools of the trade and techniques used by computer criminals and security experts.
Read more about this topic: Hacker (computer Security)
Famous quotes containing the word attacks:
“Stupidity is something unshakable; nothing attacks it without breaking itself against it; it is of the nature of granite, hard and resistant.”
—Gustave Flaubert (18211880)
“The gray glaze of the past attacks all know-how....”
—John Ashbery (b. 1927)
“Neither the wrath of Heaven nor the attacks of enemies
are as fatal as Pleasure alone when she infects the mind.”
—Silius Italicus (26101)