Hacker attack techniques and tactics: Understanding hacking strategies

This guide provides you with a plethora of tips, expert advice and Web resources that offer more in-depth information about hacker techniques and various tactics you can employ to protect your network.

Hacker tactics and techniques are constantly evolving. Hackers are continually developing new attack tools and...

hacking strategies to gain malicious access to systems and attack your network, making it difficult for organizations to develop and implement the proper polices and procedures necessary to prevent hacker attacks.

This tutorial on hacker attack techniques and tactics will provide insight inside the mind of a hacker and help you to understand a malicious attacker's motives. You will receive advice on how hackers target specific information and what polices and procedures every organization should have in place to protect sensitive data.

You will receive information on an array of specific hacker techniques and tactics, such as system fingerprinting and probing, which allow hackers to obtain access to your network systems or files. You will learn how to thwart hacker tactics and techniques with a variety of procedures and defenses, including intrusion prevention and detection (IPS/IDS) technology.

This guide also offers valuable advice on the importance of securing your network endpoints and will teach you how to mitigate the threat of hackers connecting to your computers via open network ports. You will also receive tips on how to know if you system has been compromised by a malicious hacking attempt, how to keep your wireless network secure and best practices for end-user education on current threats and preventative measures.


  Introduction: Hacker attack tactics
 How to stop hacker theft
  Hacker system fingerprinting, probing
  Using network intrusion detection tools
  Avoid physical security threats
  Authentication system security weaknesses
  Improve your access request process
  Social engineering hacker attack tactics
  Secure remote access points
 Securing your Web sever
  Wireless security basics
  How to tell if you've been hacked>

This was last published in May 2009

Dig Deeper on Malware, virus, Trojan and spyware protection and removal