Hacking (computer Security) - Attacks

Attacks

Computer security
  • Secure operating systems
  • Security by design
  • Secure coding
Computer insecurity
  • Vulnerability
    • Eavesdropping
  • Exploits
    • Trojans
    • Viruses and worms
    • Denial of service
  • Payloads
    • Rootkits
    • Keyloggers

A typical approach in an attack on Internet-connected system is:

  1. Network enumeration: Discovering information about the intended target.
  2. Vulnerability analysis: Identifying potential ways of attack.
  3. Exploitation: Attempting to compromise the system by employing the vulnerabilities found through the vulnerability analysis.

In order to do so, there are several recurring tools of the trade and techniques used by computer criminals and security experts.

Read more about this topic:  Hacking (computer Security)

Famous quotes containing the word attacks:

    Under peaceful conditions, the warlike man attacks himself.
    Friedrich Nietzsche (1844–1900)

    We are seeing an increasing level of attacks on the “selfishness” of women. There are allegations that all kinds of social ills, from runaway children to the neglected elderly, are due to the fact that women have left their “rightful” place in the home. Such arguments are simplistic and wrongheaded but women are especially vulnerable to the accusation that if society has problems, it’s because women aren’t nurturing enough.
    Grace Baruch (20th century)

    The rebel, unlike the revolutionary, does not attempt to undermine the social order as a whole. The rebel attacks the tyrant; the revolutionary attacks tyranny. I grant that there are rebels who regard all governments as tyrannical; nonetheless, it is abuses that they condemn, not power itself. Revolutionaries, on the other hand, are convinced that the evil does not lie in the excesses of the constituted order but in order itself. The difference, it seems to me, is considerable.
    Octavio Paz (b. 1914)