Changes

Jump to: navigation, search

An Overview of IT Security Threats and Attacks

75 bytes added, 18:51, 20 July 2009
no edit summary
<hr>
<google>BUY_SECURITYPLUS</google>
Before moving on to chapters that outline the steps necessary to secure networks and computer systems it helps to first have an understanding of the kinds of attacks and threats that need to be defended against. Armed with this information it will be clearer in later chapters not just how to implement particular security measures, but also why such measures need to be implemented.
Computer systems typically store the passwords which allow access to the system in a password file which is cryptographically protected from prying eyes. A number of password cracking programs are available for extracting the passwords from a password file. Some examples are the ''Crack'', ''John the Ripper'' and ''L0phtCrack'' programs, each of which attempts to decrypt password files. Obviously, the best approach to avoiding such programs being run is to prevent the password file from falling into the wrong hands and carefully monitoring systems to ensure unauthorized programs are not running.
<google>BUY_SECURITYPLUS_BOTTOM</google>
<hr><table border="0" cellspacing="0" width="100%">

Navigation menu