Hacking (computer Security) - Attacks

Attacks

Computer security
  • Secure operating systems
  • Security by design
  • Secure coding
Computer insecurity
  • Vulnerability
    • Eavesdropping
  • Exploits
    • Trojans
    • Viruses and worms
    • Denial of service
  • Payloads
    • Rootkits
    • Keyloggers

A typical approach in an attack on Internet-connected system is:

  1. Network enumeration: Discovering information about the intended target.
  2. Vulnerability analysis: Identifying potential ways of attack.
  3. Exploitation: Attempting to compromise the system by employing the vulnerabilities found through the vulnerability analysis.

In order to do so, there are several recurring tools of the trade and techniques used by computer criminals and security experts.

Read more about this topic:  Hacking (computer Security)

Famous quotes containing the word attacks:

    Literature is a defense against the attacks of life. It says to life: “You can’t deceive me. I know your habits, foresee and enjoy watching all your reactions, and steal your secret by involving you in cunning obstructions that halt your normal flow.”
    Cesare Pavese (1908–1950)

    The rebel, unlike the revolutionary, does not attempt to undermine the social order as a whole. The rebel attacks the tyrant; the revolutionary attacks tyranny. I grant that there are rebels who regard all governments as tyrannical; nonetheless, it is abuses that they condemn, not power itself. Revolutionaries, on the other hand, are convinced that the evil does not lie in the excesses of the constituted order but in order itself. The difference, it seems to me, is considerable.
    Octavio Paz (b. 1914)

    I find that with me low spirits and feeble health come and go together. The last two or three months I have had frequent attacks of the blues. They generally are upon me or within me when I am somewhat out of order in bowels, throat, or head.
    Rutherford Birchard Hayes (1822–1893)