Secure your Data by Breaking into IT!

In this paper we will take an unusual approach to system security. Instead of merely saying that something is a problem, and show _why_ it is one. y_ it is one. We will illustrate that even seemingly harmless network services can become valuable tools in the search for weak points of a syste...

Full description

Bibliographic Details
Main Author: Sumanjit Das
Format: Article
Language:English
Published: Srusti Academy of Management 2009-06-01
Series:Srusti Management Review
Online Access:http://www.srustimanagementreview.ac.in/paperfile/1122803516_Secure%20your%20Data%20by%20Breaking%20into%20IT!%20-%20Sumanjit%20Das-Vol.%20-%202%20%20%20Issue%201%20%20%20January%20%E2%80%93%20June%202009.pdf
id doaj-e87497f4559e40b98ba4ba673c91d739
record_format Article
spelling doaj-e87497f4559e40b98ba4ba673c91d7392021-10-09T09:40:01ZengSrusti Academy of ManagementSrusti Management Review0974-42742582-11482009-06-01III115120Secure your Data by Breaking into IT!Sumanjit Das0Faculty MCA, Srusti Academy of Management, Plot No.-38/1, Chandaka Industrial Estate, Near Infocity, P.O.-Patia, Bhubaneswar-31,Odisha, E-mail: dassumanjit@rediffmail.comIn this paper we will take an unusual approach to system security. Instead of merely saying that something is a problem, and show _why_ it is one. y_ it is one. We will illustrate that even seemingly harmless network services can become valuable tools in the search for weak points of a system, even when these services are operating exactly as they are intended to. exactly as they are intended to. In an effort to shed some light on how more advanced intrusions occur, this paper , this paper outlines various mechanisms that crackers have actually used to obtain access to systems and, in addition, some techniques we either suspect intruder intruders of using, or that we have used ourselves in tests or in friendly/authorized environments. My motivation for writing this paper is that system administr administrators are often unaware of the dangers presented by anything beyond the most trivial anything beyond the most trivial attacks. attacks.http://www.srustimanagementreview.ac.in/paperfile/1122803516_Secure%20your%20Data%20by%20Breaking%20into%20IT!%20-%20Sumanjit%20Das-Vol.%20-%202%20%20%20Issue%201%20%20%20January%20%E2%80%93%20June%202009.pdf
collection DOAJ
language English
format Article
sources DOAJ
author Sumanjit Das
spellingShingle Sumanjit Das
Secure your Data by Breaking into IT!
Srusti Management Review
author_facet Sumanjit Das
author_sort Sumanjit Das
title Secure your Data by Breaking into IT!
title_short Secure your Data by Breaking into IT!
title_full Secure your Data by Breaking into IT!
title_fullStr Secure your Data by Breaking into IT!
title_full_unstemmed Secure your Data by Breaking into IT!
title_sort secure your data by breaking into it!
publisher Srusti Academy of Management
series Srusti Management Review
issn 0974-4274
2582-1148
publishDate 2009-06-01
description In this paper we will take an unusual approach to system security. Instead of merely saying that something is a problem, and show _why_ it is one. y_ it is one. We will illustrate that even seemingly harmless network services can become valuable tools in the search for weak points of a system, even when these services are operating exactly as they are intended to. exactly as they are intended to. In an effort to shed some light on how more advanced intrusions occur, this paper , this paper outlines various mechanisms that crackers have actually used to obtain access to systems and, in addition, some techniques we either suspect intruder intruders of using, or that we have used ourselves in tests or in friendly/authorized environments. My motivation for writing this paper is that system administr administrators are often unaware of the dangers presented by anything beyond the most trivial anything beyond the most trivial attacks. attacks.
url http://www.srustimanagementreview.ac.in/paperfile/1122803516_Secure%20your%20Data%20by%20Breaking%20into%20IT!%20-%20Sumanjit%20Das-Vol.%20-%202%20%20%20Issue%201%20%20%20January%20%E2%80%93%20June%202009.pdf
work_keys_str_mv AT sumanjitdas secureyourdatabybreakingintoit
_version_ 1716830490848133120