Welcome! Log In Create A New Profile

Advanced

Task 6A-1 / Sources of attack

Posted by Robyn2 
Announcements Last Post
Announcement SoC Curricula 09/30/2017 01:08PM
Announcement Demarcation or scoping of examinations and assessment 02/13/2017 07:59AM
Announcement School of Computing Short Learning Programmes 11/24/2014 08:37AM
Announcement Unisa contact information 07/28/2011 01:28PM
Task 6A-1 / Sources of attack
July 19, 2008 06:26PM
Task 6A-1 / Sources of attack

1. websites that explain techniques for hacking into networks / computers
www.hellboundhackers.org
www.ardent-hacker.net
www.schoolofhackers.com

2. Hacking tools and techniques available for download:
2.1 backdoors, sniffers, enryption and password crackers; jammers, ping flooders, worms; dumpsters; data diddlers; numerous step by step ‘how to guides’.
2.2 Hack attacks can be prevented by vigilance and knowledge and regular system and network audits. Using firewalls or intrusion detection systems, highly encrypted / encoded passwords, using security scanning programmes, instituting ‘dummy’ or simulated types of hacks, gateway and address filtering; checking system performance and memory.
2.3 Yes and No. On the one hand it’s not good that hacking tools and information are freely available because they can be, and are, used irresponsibly and maliciously and they create a counter culture that urges hackers to out-hack each other to show how brave, vicious, clever they are. On the other hand, a good saying is “keep your friends close but your enemies closer.” Only by knowing what and how hackers are doing things, can people & companies protect their networks and information.
2.4 Network administrators wouldn’t be doing their jobs properly if they didn’t monitor hack and crack sites. If they are not up-to-date with the latest threats and threat technologies they leave the system open to attack and won’t know how to defend or repair it. However there’s always the risk that an administrator could use this knowledge from within to destroy and damage systems.
Sorry, only registered users may post in this forum.

Click here to login