MIS427 Lecture : MIS 427.docx

97 views27 pages

Document Summary

Hit and run (get in and then get out) Target data at service in certain from. Go into a log and then erase that you were even there. However that information should have been mirrored somewhere else. Ongoing hack (monitor and track: gathering data. Open doors(disable antivirus ie norton update points back to itself: cover track and install tools. Change programs names and add new ones. Add startup files: gather sensitive info. Ways to find out who the target is and how to attack. Default use of web page that tells software versions. Netcraft. com (bottom left what"s that site running) Use one business to gain access to another. Find the easy entry to get to the more complicated one. Understand the flow of information is first thing you do when you are heard of it security. Employees wanting to steal data for themselves. Free time to run interesting, free software. Testing of software that causes grief on a trusted network.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers