I l @ ve RuBoard |
Gaining access is the most important step in an attack. The first contact is the most critical. It is at this point that the hacker has the most exposure, since it is at this point that he has the least information about the system. He doesn't yet know how well the system is managed, or if there are auditing or trip wires in place to warn the administrators of unauthorized access. He will try to quickly ascertain if the system is well managed or not, preferably before he has actually logged in to it or set off any alarms. This is when you need your best alarms. If a hacker already has access to the machine, his battle is half won. This is the best time to halt the hacker, before he gets on your machine. Keeping a hacker off of your system is much easier than getting a hacker out of your system. |
I l @ ve RuBoard |