Home arrow Security arrow Page 2 - What’s behind the curtain? Part I

Types of attackers - Security

It's no secret that any computer connected to the Internet faces a wide array of security threats. These days, however, a business needs to be connected to the Internet just to do business. What can you do? Keep reading to learn more about risks you take, and what you can do to protect yourself and your company.

  1. What’s behind the curtain? Part I
  2. Types of attackers
  3. Anatomy of an attack
  4. Targets
  5. Malicious Code
  6. Backdoors
By: Eliana Stavrou
Rating: starstarstarstarstar / 9
February 21, 2005

print this article



Before moving into a discussion of the security threats that exist on the Internet, we should know who sets up these attacks in the first place, and for what objective.

In general, there are two types of intruders that pose a threat to security: external and internal.

The most commonly known intruder is a hacker or cracker (I won’t get into a discussion of the exact definition; simply assume that these terms are used in a negative way. After all, a violation is still a violation whatever its purpose). The aim of their attacks is to steal, damage, or  just to have fun! Usually they have great skills and they know what they are looking for.

However, studies have shown that 70 to 80 percent of attacks come from within an organization. Do you completely trust the person sitting next to you at the office? If yes, stop trusting them! If he gets fired next week and he wants revenge, he could use your password (that you gave him a month ago when he had a problem with his PC) to get into the company’s system and delete all the customers.

Every employee is a potential threat to the company. Ignorance can cause the same damage as if an attack is set intentionally. In general, an internal user may attack for any other number of reasons, including data theft to sell information to competitors and sabotage.  

Off course, external attacks get so much publicity that organizations spend a large portion of their security budget to avoid having a security violation. After all, their reputation is what brings money to the company; would you do business with a company that got hacked three times in the last year?

>>> More Security Articles          >>> More By Eliana Stavrou

blog comments powered by Disqus
escort Bursa Bursa escort Antalya eskort


- Secure Your Business for Data Privacy Day
- Google Testing Security Fob Password Alterna...
- Security News Highlights Concerns
- Going to Extremes for Data Security
- Skipfish Website Vulnerability Scanner
- Critical Microsoft Visual Studio Security Pa...
- US Faces Tech Security Expert Deficit
- LAN Reconnaissance
- An Epilogue to Cryptography
- A Sequel to Cryptography
- An Introduction to Cryptography
- Security Overview
- Network Security Assessment
- Firewalls
- What’s behind the curtain? Part II

Developer Shed Affiliates


Dev Shed Tutorial Topics: