Preview

Computer Attack Help

Good Essays
Open Document
Open Document
836 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Computer Attack Help
Phase 1 - Reconnaissance
Reconnaissance is probably the longest phase, sometimes lasting weeks or months. The black hat uses a variety of sources to learn as much as possible about the target business and how it operates, including * Internet searches * Social engineering * Dumpster diving * Domain name management/search services * Non-intrusive network scanning
The activities in this phase are not easy to defend against. Information about an organization finds its way to the Internet via various routes. Employees are often easily tricked into providing tidbits of information which, over time, act to complete a complete picture of processes, organizational structure, and potential soft-spots. However, there are some things you can do which make it much harder for an attacker, including * Make sure your systems don’t leak information to the Web, including: * Software versions and patch levels * Email addresses * Names and positions of key personnel * Ensure proper disposal of printed information * Provide generic contact information for domain name registration lookups * Prevent perimeter LAN/WAN devices from responding to scanning attempts
Phase 2 - Scanning
Once the attacker has enough information to understand how the business works and what information of value might be available, he or she begins the process of scanning perimeter and internal network devices looking for weaknesses, including * Open ports * Open services * Vulnerable applications, including operating systems * Weak protection of data in transit * Make and model of each piece of LAN/WAN equipment
Scans of perimeter and internal devices can often be detected with intrusion detection (IDS) or prevention (IPS) solutions, but not always. Veteran black hats know ways around these controls. In any case, some steps you can take to thwart scans include * Shutting down all unneeded ports and services * Allow critical devices, or

You May Also Find These Documents Helpful

  • Satisfactory Essays

    This is when the hacker places a back door that could be done by installing a program that can give the hacker unlimited access to the database anytime which could compromise any important data such as customer personal information or even company information.…

    • 255 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    An essential part of network security is knowing what the characteristics of an attack are, so they can be countered or prevented. When the university suffered an overwhelming internal DDoS attack, it required administrators to reevaluate its security guidelines based on what was known about the attack.…

    • 1279 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    * The hackers can gain access to a company’s payment processing network. The attackers then installed malicious code designed to gather sensitive information from the network, which allowed them to easily access the network at their convenience.…

    • 275 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Sec 280 Week 1 Case Study

    • 408 Words
    • 2 Pages

    Port scans and Ping sweeps are something that everyone should know about and know what they do. These are something that every company should worry about. These are the most common ways that hackers will get information from other computers. One of the first things you can do in order to block unauthorized access to it, is to block unneeded ports on your computer, and disable applications that are not really needed and that can be risky for your computer. It is highly…

    • 408 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Reconnaissance is probably the longest phase, sometimes lasting weeks or months. The black hat uses a variety of sources to learn as much as possible about the target business and how it operates, including…

    • 377 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Aup Definition

    • 554 Words
    • 3 Pages

    You will learn to recognize security events and baseline anomalies that might indicate suspicious activity.…

    • 554 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    In our recent negotiation, my partner Dave and I assumed the roles of Alan Hacker, a computer software developer, and Alan Hacker’s lawyer. Being the lawyer in the negotiation my objective was to avoid litigation with my client’s partner Stanley Star and to aid in the continuation of my client’s co-owned company HackerStar. In addition, I would assist Hacker in coming to an agreement that would be satisfying for him both personally and financially. I felt that Dave and I presented a reasonable argument on Hacker’s behalf and, since I was able to apply some of our class readings during the process, I was overall pleased with the outcome.…

    • 1142 Words
    • 5 Pages
    Better Essays
  • Good Essays

    According to Mathew, “It is very important for companies to consider the smartest ways to first detect, block, and subsequently investigate employees with malicious motives”; joined to a vigorous external process that outlines preventative mechanisms that are designed and implemented around an ERP that is based on a review of hundreds of attacks. Hence the best way to identify, then possibly prevent an internal or external attack is to start with a security audit specifically created as a countermeasure; simply an attack prevention program.…

    • 639 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Technology: Now-a-days many organization are changing by the adoption of new technology which usually goes out as a disruptive one at first but later on eventually it…

    • 797 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    cyber attacks

    • 1223 Words
    • 5 Pages

    “Now comrades, what is the nature of this life of ours? Let us face it: our lives are miserable, laborious, and short. We are born, we are given just so much food as will keep the breath in our bodies, and those of us who are capable of it are forced to work to the last atom of our strength; and the very instant that our usefulness has come to an end we are slaughtered with hideous cruelty. No animal in England knows the meaning of happiness or leisure after he is a year old. No animal in England is free. The life of an animal is misery and slavery: this is the plain truth.”…

    • 1223 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Q What ways can executives and other organizational leaders learn about day-to-day business operations besides going “undercover?”…

    • 503 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Access Control List

    • 330 Words
    • 2 Pages

    System configuration must ensure that no loopholes are left to protect the network from all forms of vulnerabilities…

    • 330 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Cyber Attacks

    • 644 Words
    • 3 Pages

    The rising threat of terrorism has led to unprecedented levels of security at Indian airports, railway stations, hotels, ports etc. But the…

    • 644 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Competitive Forces

    • 6184 Words
    • 25 Pages

    Awareness of these forees can help a company stake out a position in its industry that is less vulnerable to attack…

    • 6184 Words
    • 25 Pages
    Powerful Essays
  • Powerful Essays

    The automated process of proactively identifying vulnerabilities of computing systems in a network in order to determine if and where a system can be exploited andthreatened While public servers are important for communication and data transfer over the Internet, they open the door to potential security breaches by threat agents, such as malicious hackers. Vulnerability scanning employs software that seeks out security flaws based on a database of known flaws, testing systems for the occurrence of these flaws and generating a report of the findings that an individual or an enterprise can use to tighten the networks security.…

    • 3248 Words
    • 13 Pages
    Powerful Essays