Secure your Data by Breaking into IT!
In this paper we will take an unusual approach to system security. Instead of merely saying that something is a problem, and show _why_ it is one. y_ it is one. We will illustrate that even seemingly harmless network services can become valuable tools in the search for weak points of a syste...
Main Author: | |
---|---|
Format: | Article |
Language: | English |
Published: |
Srusti Academy of Management
2009-06-01
|
Series: | Srusti Management Review |
Online Access: | http://www.srustimanagementreview.ac.in/paperfile/1122803516_Secure%20your%20Data%20by%20Breaking%20into%20IT!%20-%20Sumanjit%20Das-Vol.%20-%202%20%20%20Issue%201%20%20%20January%20%E2%80%93%20June%202009.pdf |
Summary: | In this paper we will take an
unusual approach to system
security. Instead of merely saying
that something is a problem, and
show _why_ it is one. y_ it is one. We will
illustrate that even seemingly
harmless network services can
become valuable tools in the search
for weak points of a system, even
when these services are operating
exactly as they are intended to. exactly as they are intended to.
In an effort to shed some light on
how more advanced intrusions
occur, this paper , this paper outlines various
mechanisms that crackers have
actually used to obtain access to
systems and, in addition, some
techniques we either suspect
intruder intruders of using, or that we have
used ourselves in tests or in
friendly/authorized environments.
My motivation for writing this
paper is that system
administr administrators are often unaware
of the dangers presented by
anything beyond the most trivial anything beyond the most trivial
attacks. attacks. |
---|---|
ISSN: | 0974-4274 2582-1148 |