Secure your Data by Breaking into IT!
In this paper we will take an unusual approach to system security. Instead of merely saying that something is a problem, and show _why_ it is one. y_ it is one. We will illustrate that even seemingly harmless network services can become valuable tools in the search for weak points of a syste...
Main Author: | |
---|---|
Format: | Article |
Language: | English |
Published: |
Srusti Academy of Management
2009-06-01
|
Series: | Srusti Management Review |
Online Access: | http://www.srustimanagementreview.ac.in/paperfile/1122803516_Secure%20your%20Data%20by%20Breaking%20into%20IT!%20-%20Sumanjit%20Das-Vol.%20-%202%20%20%20Issue%201%20%20%20January%20%E2%80%93%20June%202009.pdf |
id |
doaj-e87497f4559e40b98ba4ba673c91d739 |
---|---|
record_format |
Article |
spelling |
doaj-e87497f4559e40b98ba4ba673c91d7392021-10-09T09:40:01ZengSrusti Academy of ManagementSrusti Management Review0974-42742582-11482009-06-01III115120Secure your Data by Breaking into IT!Sumanjit Das0Faculty MCA, Srusti Academy of Management, Plot No.-38/1, Chandaka Industrial Estate, Near Infocity, P.O.-Patia, Bhubaneswar-31,Odisha, E-mail: dassumanjit@rediffmail.comIn this paper we will take an unusual approach to system security. Instead of merely saying that something is a problem, and show _why_ it is one. y_ it is one. We will illustrate that even seemingly harmless network services can become valuable tools in the search for weak points of a system, even when these services are operating exactly as they are intended to. exactly as they are intended to. In an effort to shed some light on how more advanced intrusions occur, this paper , this paper outlines various mechanisms that crackers have actually used to obtain access to systems and, in addition, some techniques we either suspect intruder intruders of using, or that we have used ourselves in tests or in friendly/authorized environments. My motivation for writing this paper is that system administr administrators are often unaware of the dangers presented by anything beyond the most trivial anything beyond the most trivial attacks. attacks.http://www.srustimanagementreview.ac.in/paperfile/1122803516_Secure%20your%20Data%20by%20Breaking%20into%20IT!%20-%20Sumanjit%20Das-Vol.%20-%202%20%20%20Issue%201%20%20%20January%20%E2%80%93%20June%202009.pdf |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Sumanjit Das |
spellingShingle |
Sumanjit Das Secure your Data by Breaking into IT! Srusti Management Review |
author_facet |
Sumanjit Das |
author_sort |
Sumanjit Das |
title |
Secure your Data by Breaking into IT! |
title_short |
Secure your Data by Breaking into IT! |
title_full |
Secure your Data by Breaking into IT! |
title_fullStr |
Secure your Data by Breaking into IT! |
title_full_unstemmed |
Secure your Data by Breaking into IT! |
title_sort |
secure your data by breaking into it! |
publisher |
Srusti Academy of Management |
series |
Srusti Management Review |
issn |
0974-4274 2582-1148 |
publishDate |
2009-06-01 |
description |
In this paper we will take an
unusual approach to system
security. Instead of merely saying
that something is a problem, and
show _why_ it is one. y_ it is one. We will
illustrate that even seemingly
harmless network services can
become valuable tools in the search
for weak points of a system, even
when these services are operating
exactly as they are intended to. exactly as they are intended to.
In an effort to shed some light on
how more advanced intrusions
occur, this paper , this paper outlines various
mechanisms that crackers have
actually used to obtain access to
systems and, in addition, some
techniques we either suspect
intruder intruders of using, or that we have
used ourselves in tests or in
friendly/authorized environments.
My motivation for writing this
paper is that system
administr administrators are often unaware
of the dangers presented by
anything beyond the most trivial anything beyond the most trivial
attacks. attacks. |
url |
http://www.srustimanagementreview.ac.in/paperfile/1122803516_Secure%20your%20Data%20by%20Breaking%20into%20IT!%20-%20Sumanjit%20Das-Vol.%20-%202%20%20%20Issue%201%20%20%20January%20%E2%80%93%20June%202009.pdf |
work_keys_str_mv |
AT sumanjitdas secureyourdatabybreakingintoit |
_version_ |
1716830490848133120 |