Hour 19. What Hackers Do

What You'll Learn in This Hour:

  • Types of intruders

  • Goals of the intruder

  • Intrusion techniques

When the experts started designing networks, they had no idea that legions of unauthorized users would spend thousands of hours trying to get inside. This hour describes some of the methods used for network attacks.

At the completion of this hour, you'll be able to

  • Describe how hackers obtain passwords

  • Describe how intruders access systems using buffer overflow, script tricks, session hijacking, and email worms

  • Discuss methods for establishing permanent control of a system

  • Describe denial-of-service attacks



Sams Teach Yourself TCP/IP in 24 Hours
Sams Teach Yourself TCP/IP in 24 Hours (4th Edition)
ISBN: 0672329964
EAN: 2147483647
Year: 2003
Pages: 259
Authors: Joe Casad

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net