Sunday, December 8, 2013

Attacks Weaknesses and Threats

The subject of some controversy today as it promises to talk about who is who, what is a hacker , cracker , whitehat .. ? , Sure the opinions are diverse, we debate it if I was born . In the last part of the song talk about various hacking tools and documentation facilitates you about them.

I hope you enjoy and thank you all for supporting us on our way , we can all be great .


Attacks Weaknesses and Threats
In the first chapter we saw that there are physical and logical threats that may affect
hardware or data , before presenting in detail the types of attackers we
revisit the issue of threats to watch them more closely.


- Interrupt: Corruption or damage in one part of the system that prevents
operation .
immediate detection
Examples : Destruction of the hardware.
 Deleting programs, data
 Operating System Faults
- Intercept : Access to information by unauthorized persons. use
privileges not granted .


Detection difficult, sometimes leaves no trace , does not alter the information, but if you get it .
Examples : subject is connected to a public wifi ap is a fake access point and all
transmit data through this connection will be read and heard.
Copies Illicit websites phishing , interception of communications, both
network
- Modification By accessing the system the attacker modifies its content in its
own benefit.
Example : Deface ( gain root privileges on a website to display the content
that the attacker wishes )

It can also be hardware modification
Generation : Creating new objects within the system
detection difficult
Examples Add a user to the database
 Add unauthorized transactions

Assets to be protected from these threats and their risk classification :
Assets
• Assets are the resources information system or related to , necessary
for the organization to operate correctly and achieve the goals set by
your address.
• The key asset is the information handled by the system, or data . And about
of these data can identify other significant assets :
• The services that can be provided by those data , and services

Well now we know what threats exist and to be protected .
Let attackers types :
Types attackers
Well in this part we will dive into the wonderful world abundantly
hacking underground .
To say that there is no "official" definition for each of the actors in
the world of computer security and who therefore can not agree with
definitions offered here but these have been chosen to be the most widely
accordance with the current scene.
I 'll expand on these points especially since it seems of vital importance
delete the popular idea that the terrorist computer hacker as this is far
far from reality .
Hacker- Whitehack For these terms we need a further definition .
 - Backhack
 - Greyhack
Pentester : Internal or external staff dedicated to verify the safety of a
company or system to address the vulnerabilities . Security policymakers
adapting to the rules of both the company and institutional. They defend the
large companies and corporations most of them call themselves white hat
or ethical hackers but below we will see the sense , in my opinion , more pure
word .
Wannabe : Draft hacker , share philosophy but still learning , its
learning is seriously so there is despised by the community
Hacktivist : A person or group who uses his computer skills to protests
social . Not have to be hackers often use tools
cryptoanarquistas designed to them.
Cryptoanarquista : "" " The criptoanarquismo is an ideology or strategy shown
in favor of the use of asymmetric cryptography to enforce privacy and
individual freedom. Term popularized by Timothy C. May, is described by Vernor
Vinge cyberspace as performing the anarcocapitalismo.1 The criptoanarquistas
point to the goal of creating cryptographic software that can be used to circumvent the
prosecution and harassment to send and receive information in computer networks .
Timothy C. May writes on criptoanarquismo in Cyphernomicon :
What emerges from all this is not clear , but I think it will be a form of
anarcho-capitalist market system I call " criptoanarquía " .
Cracker : "" " The term cracker has several meanings in the area of ??computer :
- A person who violates the security of a computer system for profit
staff or mischief .
- A person who designs computer program or cracks which serve to modify the
behavior or extend the functionality of the original hardware or software that
apply .

No comments:

Post a Comment