CHAPTER 15
PENETRATING COMPUTER SYSTEMS AND NETWORKS
Chey Cobb, Stephen Cobb, and M. E. Kabay
15.1 MULTIPLE FACTORS INVOLVED IN SYSTEM PENETRATION
15.1.1 System Security: More than a Technical Issue
15.2 NONTECHNICAL PENETRATION TECHNIQUES
15.2.1 Misrepresentation (Social Engineering)
15.2.2 Incremental Information Leveraging
15.3 TECHNICAL PENETRATION TECHNIQUES
15.3.1 Data Leakage: A Fundamental Problem
15.3.2 Intercepting Communications
15.3.3 Breaching Access Controls
15.3.5 Penetration Testing, Toolkits, and Techniques
15.3.6 Penetration via Web Sites
15.3.7 Role of Malware and Botnets
15.4 POLITICAL AND LEGAL ISSUES
15.4.1 Exchange of System Penetration Information
15.1 MULTIPLE FACTORS INVOLVED IN SYSTEM PENETRATION.
Although penetrating computer systems and networks may sound like a technical challenge, most information security professionals are aware that systems security has both technical and nontechnical aspects. Both aspects come into play when people attempt to penetrate systems. Both aspects are addressed in this chapter, which is not a handbook on how to penetrate systems but rather a review of the methods and means by which systems penetrations are accomplished.
15.1.1 System Security: More than a Technical Issue.
The primary nontechnical factor in system security and resistance ...
Get Computer Security Handbook, Fifth Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.