Home arrow Security arrow Page 5 - What’s behind the curtain? Part II

Conclusion - Security

In this second of a three-part series covering threats to computer security, we focus on attacks that are more specifically directed against a particular person or company.

TABLE OF CONTENTS:
  1. What’s behind the curtain? Part II
  2. Denial of service (DoS) attack
  3. Password cracking attack
  4. Social engineering attack
  5. Conclusion
By: Eliana Stavrou
Rating: starstarstarstarstar / 8
February 28, 2005

print this article
SEARCH DEV SHED

TOOLS YOU CAN USE

advertisement

As we can see from the discussion in this article, we may face a range of threats that are either set using specialized tools (denial of service, password cracking, packet sniffing) or are implemented by the human factor (social engineering). The widespread usage of hacking tools and the ease with which they can be used to damage are the main factors that cause more and more attacks to be listed everyday. Of course, human innocence (or lack of knowledge) adds to the problem and makes it even bigger. 

We should not take for granted the need for security. Even the most secure system can be damaged by a well organized threat. Therefore we must be alert at all times, waiting for the unexpected.
 
We will continue the discussion of the possible threats you may encounter when using the Internet in the next article.


Resources

http://www.cert.org/tech_tips/denial_of_service.html

http://www.cisco.com/warp/public/707/newsflash.html

http://whatis.techtarget.com/definition/
0,289893,sid9_gci213591,00.html


http://searchsecurity.techtarget.com/sDefinition/
0,,sid14_gci557336,00.html

http://eyeonsecurity.org/articles/sniffers.html

http://geodsoft.com/howto/password/cracking_passwords.htm

http://searchsecurity.techtarget.com/sDefinition/
0,,sid14_gci531120,00.html

http://www.nmrc.org/pub/faq/hackfaq/hackfaq-04.html



 
 
>>> More Security Articles          >>> More By Eliana Stavrou
 

blog comments powered by Disqus
escort Bursa Bursa escort Antalya eskort
   

SECURITY ARTICLES

- Secure Your Business for Data Privacy Day
- Google Testing Security Fob Password Alterna...
- Security News Highlights Concerns
- Going to Extremes for Data Security
- Skipfish Website Vulnerability Scanner
- Critical Microsoft Visual Studio Security Pa...
- US Faces Tech Security Expert Deficit
- LAN Reconnaissance
- An Epilogue to Cryptography
- A Sequel to Cryptography
- An Introduction to Cryptography
- Security Overview
- Network Security Assessment
- Firewalls
- What’s behind the curtain? Part II

Developer Shed Affiliates

 


Dev Shed Tutorial Topics: