This chapter looks at methods of tricking people into allowing unauthorized access to systems. Systems can be attacked at the client, at the server, or at the connection between the two. Experienced criminal hackers tend to favor the nontechnical attack over the technical and the best defense, employee awareness, is also nontechnical. The cheapest and most effective attacks are often nontechnical, exploiting human frailty rather than weaknesses in the technology. People responsible for securing systems have to defend against this wide range of penetration methods. Penetration of information systems is possible by means of a wide range of methods, some of which are very hard to defend against. Both technical and nontechnical aspects come into play when people attempt to penetrate security systems. This chapter discusses different aspects of penetration of computer systems and networks.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |