SearchSecurity.com's Guide to Thwarting Hacker Techniques

This guide provides you with a plethora of tips, expert advice and Web resources that offer more in-depth information about hacker techniques and various tactics you can employ to protect your network.

This Content Component encountered an error
In our recent series on Thwarting Hacker Techniques, you learned common strategies used by hackers to attack your network, as well as some methods for preventing them. This follow-up guide provides you with a plethora of tips, expert advice and Web resources that offer more in-depth information about each technique and various tactics you can employ to protect your network.

TABLE OF CONTENTS

   Reconnaissance
   Probing and Fingerprinting
   Detecting Intrusions While Saving Money
   Network Security -- You Should Know Jack
   Authentication Weaknesses
   Improving Access Requests
   Combating Social Engineers
   Securing Remote User Access Points
   Internet Data Manipulation
   Wireless Security Basics
   Signs of a Compromised System
   More Security Learning Resources

  Reconnaissance  Return to Table of Contents
In Thwarting hacker techniques: Reconnaissance, you learned that a hacker's first step is to look for any information they can find about your company's infrastructure. Now read more about what you can do to protect your information.

  Probing and Fingerprinting  Return to Table of Contents
In the tip, Thwarting hacker techniques: Probing and fingerprinting, you read about the tools hackers use to identify specs about your hardware and software configurations. Now read more about what you can do to protect against them.

  Detecting Intrusions While Saving Money  Return to Table of Contents
In Thwarting hacker techniques: Detecting intrusions while saving money You learned how to detect and prevent intrusions without breaking the bank. Now read more about the low-budget IDS/IPS tools you can use.

  Network Security -- You Should Know Jack  Return to Table of Contents
You learned about the importance of securing your active network jacks, in the tip Thwarting Hacker Techniques: Network security -- You should know Jack, now learn more about how to prevent hackers from connecting their computers to your network through open jacks.

  Authentication Weaknesses  Return to Table of Contents
In the tip Thwarting Hacker Techniques -- Authentication weaknesses, you learned that weak usernames and passwords are often the key to a hacker's success. Now read more about methods for beefing up your authentication processes.

  Improving Access Requests  Return to Table of Contents
In the tip Thwarting Hacker techniques: Improving Access requests, you learned that outdated access requests leave you wide-open to attack. Here are more tips for improving your access request processes.

  Combating Social Engineers  Return to Table of Contents
You learned about the importance of teaching end users about social engineering in the tip Thwarting Hacker Techniques: Combating social engineers, now read more about how to protect your network from the inside out.

  Securing Remote User Access Points  Return to Table of Contents
In the tip Thwarting Hacker Techniques -- Securing remote user access points, you learned that poorly configured remote access points can be an open door into your network. Now read more about tactics for securing your remote access points to close the door on hackers.

  Internet Data Manipulation  Return to Table of Contents
You learned the importance of securing your Web server in the tip Thwarting Hacker Techniques: Internet data manipulation, now read more about best practices for securing it and keeping your data safe.

  Wireless Security Basics  Return to Table of Contents
In the tip Thwarting Hacker Techniques: Wireless security basics, you learned about wireless security risks and some methods for keeping your wireless network secure. Now read more in-depth information about tactics for securing your wireless network.

  Signs of a Compromised System  Return to Table of Contents
In the tip Thwarting Hacker Techniques: Signs of a compromised system, you learned a few methods for determining whether your system has been hacked. Now read more about how to tell if your system has been compromised and actions to take if you've been hacked.
More Security Learning Resources
SECURITY SCHOOL LEARNING GUIDES CHECKLISTS GLOSSARY ASK THE EXPERTS
This was first published in December 2005

Dig deeper on Hacker Tools and Techniques: Underground Sites and Hacking Groups

Pro+

Features

Enjoy the benefits of Pro+ membership, learn more and join.

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close