Hour 19. What Hackers Do
What You'll Learn in This Hour:
Types of intruders Goals of the intruder Intrusion techniques
When the experts started designing networks, they had no idea that legions of unauthorized users would spend thousands of hours trying to get inside. This hour describes some of the methods used for network attacks.
At the completion of this hour, you'll be able to
Describe how hackers obtain passwords Describe how intruders access systems using buffer overflow, script tricks, session hijacking, and email worms Discuss methods for establishing permanent control of a system Describe denial-of-service attacks
|