Preview

List Phrases of a Computer Attack

Satisfactory Essays
Open Document
Open Document
377 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
List Phrases of a Computer Attack
First and for most this process I found out seems like a whole lot of hassle so I don’t understand why people would do this and just get caught in the end. But I will be listing 5 general phases of a computer attack that one would have to go through to be successful in other words jumping through hoops that are on fire.
Phase 1 - Reconnaissance
Reconnaissance is probably the longest phase, sometimes lasting weeks or months. The black hat uses a variety of sources to learn as much as possible about the target business and how it operates, including * Internet searches * Social engineering * Dumpster diving * Domain name management/search services * Non-intrusive network scanning

Phase 2 - Scanning
Once the attacker has enough information to understand how the business works and what information of value might be available, he or she begins the process of scanning perimeter and internal network devices looking for weaknesses, including * Open ports * Open services * Vulnerable applications, including operating systems * Weak protection of data in transit * Make and model of each piece of LAN/WAN equipment

Phase 3 - Gaining Access
Gaining access to resources is the whole point of a modern-day attack. The usual goal is to either extract information of value to the attacker or use the network as a launch site for attacks against other targets. In either situation, the attacker must gain some level of access to one or more network devices.
Phase 4 - Maintaining Access
Having gained access, an attacker must maintain access long enough to accomplish his or her objectives. Although an attacker reaching this phase has successfully circumvented your security controls, this phase can increase the attacker’s vulnerability to detection.
Phase 5 – Covering Tracks
After achieving his or her objectives, the attacker typically takes steps to hide the intrusion and possible controls left behind for future visits. Again, in

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Lab 9

    • 1001 Words
    • 3 Pages

    Unauthorized access to data centers, computer rooms and wiring closets, servers must be shut down occasionally for maintenance causing network downtime, data can be easily lost or corrupt and recovering critical business functions may take too long to be useful.…

    • 1001 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1330 Unit 6 Paper

    • 579 Words
    • 3 Pages

    The Custom woodworking Company has been in the custom furniture business since the early 1950’s. Since their inception they have grown their business and reputation steadily. This growth has demonstrated a need for the company to expand its existing factory floor space. Therefore, the companies stakeholders have agreed to expand the existing property by adding “additional production capacity equivalent to 25% of the existing floor space” (Wideman). Moreover, the floor space would contain “air-conditioning, a dust-free paint and finishing shop, an automatic wood working production train, as well renovated offices for the President and Executive Vice President” (Wideman). The total renovation costs have been outlined not to exceed…

    • 579 Words
    • 3 Pages
    Powerful Essays
  • Satisfactory Essays

    This is when the hacker places a back door that could be done by installing a program that can give the hacker unlimited access to the database anytime which could compromise any important data such as customer personal information or even company information.…

    • 255 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    This is a very common type of threat we see very frequently in our lifetimes, mostly by individuals. In terms of stolen data/ theft of data is done by hacking and the duration of their damage cannot be predicted for certain people or businesses. Things such as investment plans or architectural designs of a business can be spread over social media over the internet, competitors as well as business start-ups would be more than happy to know about this, and as you can imagine the damage of that cannot be predicted or estimate, when in relation to the period of that lasting damage.…

    • 1232 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    The network infrastructure is the first line of defense between the Internet and public facing web servers. Firewalls provide the first line of defense in network security infrastructures. They accomplish this by comparing corporate policies about users' network access rights to the connection information surrounding each access attempt. User policies and connection information must match up, or the firewall does not grant access to network resources; this helps avert break-ins.…

    • 1214 Words
    • 4 Pages
    Powerful Essays
  • Better Essays

    This allows attackers to eavesdrop on communications, steal data directly from the services and users and to impersonate services and users. (Codenomicon, 2014)…

    • 1355 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Lab 1

    • 567 Words
    • 3 Pages

    5. What does the enumeration step of the five (5) step hacking process entail and how is it vital to the hacker’s objective?…

    • 567 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    Rlht Task 2

    • 529 Words
    • 3 Pages

    Log Retention: In this scenario the attacker patiently executed his or her plan to gain access over several months, avoiding detection, and exploiting the lack of long term security log retention. The Guide to Computer Security Log Management,…

    • 529 Words
    • 3 Pages
    Better Essays
  • Good Essays

    Sec 280 Week 1

    • 667 Words
    • 3 Pages

    The next technique that can be used is called a port scanner, what a port scanner does is looks for any and all ports that can be accessed to put it in simple terms it is looking for any open routes (or doorways) into the computer or network it is scanning. Port scanning by itself can and is a useful tool; essentially, a port scan consists of sending a message to each port, one at a time. The response the person doing the scanning gets indicates whether the port is being used or not and from there the attacker can research the port for weakness. Typical ports scans can show up in system logs and thus…

    • 667 Words
    • 3 Pages
    Good Essays
  • Good Essays

    lines, and getting a hold of information previously not accessible. While these actions can be…

    • 625 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    References: 1. Duncan Haughey, 2011, Project Planning a Step by Step Guide, Retrieved September 13,2011 from…

    • 2679 Words
    • 11 Pages
    Powerful Essays
  • Satisfactory Essays

    Hacking2E Lab03 AW

    • 563 Words
    • 3 Pages

    The first phase of hacking is the footprinting phase, which is designed to passively gain…

    • 563 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    * The breaking down of large activities into comprehensible or manageable units is a fundamental part of project management.…

    • 588 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    As I read an article written by Mr. Mathew J. Schwartz, dated March 12. 2012, for InformationWeek via darkreading.com, and ponder the strength of the subject matter discussed, I asked myself the question when does attack prevention begin? The question does present an abstract yet requires that careful thought be exercised when approaching information security breaches, and how to prevent attacks; a technological melancholy with very expensive associations.…

    • 639 Words
    • 3 Pages
    Good Essays
  • Good Essays

    A new style of attack is a social engineering attack in which criminals attempt to gain some basic…

    • 438 Words
    • 2 Pages
    Good Essays