This tutorial on hacker attack techniques and tactics will provide insight inside the mind of a hacker and help you to understand a malicious attacker's motives. You will receive advice on how hackers target specific information and what polices and procedures every organization should have in place to protect sensitive data.
You will receive information on an array of specific hacker techniques and tactics, such as system fingerprinting and probing, which allow hackers to obtain access to your network systems or files. You will learn how to thwart hacker tactics and techniques with a variety of procedures and defenses, including intrusion prevention and detection (IPS/IDS) technology.
This guide also offers valuable advice on the importance of securing your network endpoints and will teach you how to mitigate the threat of hackers connecting to your computers via open network ports. You will also receive tips on how to know if you system has been compromised by a malicious hacking attempt, how to keep your wireless network secure and best practices for end-user education on current threats and preventative measures.
Requires Free Membership to View
HACKER ATTACK TECHNIQUES AND TACTICS
Introduction: Hacker attack tactics
How to stop hacker theft
Hacker system fingerprinting, probing
Using network intrusion detection tools
Avoid physical security threats
Authentication system security weaknesses
Improve your access request process
Social engineering hacker attack tactics
Secure remote access points
Securing your Web sever
Wireless security basics
How to tell if you've been hacked
This was first published in May 2009
Security Management Strategies for the CIO
Join the conversationComment
Share
Comments
Results
Contribute to the conversation