Home arrow Security arrow Page 3 - Whatís behind the curtain? Part I

Anatomy of an attack - Security

It's no secret that any computer connected to the Internet faces a wide array of security threats. These days, however, a business needs to be connected to the Internet just to do business. What can you do? Keep reading to learn more about risks you take, and what you can do to protect yourself and your company.

TABLE OF CONTENTS:
  1. Whatís behind the curtain? Part I
  2. Types of attackers
  3. Anatomy of an attack
  4. Targets
  5. Malicious Code
  6. Backdoors
By: Eliana Stavrou
Rating: starstarstarstarstar / 9
February 21, 2005

print this article
SEARCH DEV SHED

TOOLS YOU CAN USE

advertisement

In order to defend against any security threat, you should know the process that attackers go through to exploit a system. In this section I briefly cover the issue, and you can search the Internet for more information on the subject.

An attack is a three step process:

  1. Decide on the target.

    The first thing an attacker will do is decide on their target. Some attacks are set against specific targets and others are set arbitrarily, depending upon the reason for the attack in the first place. Once the target is identified, the attacker moves to the next step, which is information gathering.
       
  2. Information gathering.

    Before placing an attack, the attacker must gather information about the systems under attack, such as the operating system used, the architecture of the system, IP addresses, the types of servers and services used. The scanning can be performed using appropriate network scanners that are widely available on the Internet.
  3. Place the attack.

    Finally, the attack is set based on the evidence found on the previous steps. After the attacker understands the environment he is going after, he can use the information gathered to identify well known vulnerabilities and exploit them to gain access to a system. Once the mission is carried out, the attacker may try to cover his tracks such as changing the logs. Just have in mind that the more skilled an attacker, the more focused the attack will be.



 
 
>>> More Security Articles          >>> More By Eliana Stavrou
 

blog comments powered by Disqus
escort Bursa Bursa escort Antalya eskort
   

SECURITY ARTICLES

- Secure Your Business for Data Privacy Day
- Google Testing Security Fob Password Alterna...
- Security News Highlights Concerns
- Going to Extremes for Data Security
- Skipfish Website Vulnerability Scanner
- Critical Microsoft Visual Studio Security Pa...
- US Faces Tech Security Expert Deficit
- LAN Reconnaissance
- An Epilogue to Cryptography
- A Sequel to Cryptography
- An Introduction to Cryptography
- Security Overview
- Network Security Assessment
- Firewalls
- Whatís behind the curtain? Part II

Developer Shed Affiliates

 


Dev Shed Tutorial Topics: