Abtrusion Security Click here to send someone a link to this page Click here to Bookmark this page
home   products   buy   download   support   about   news   links   contact

Abtrusion Security home

Security products

Purchase Abtrusion Protector

Download of security software for Windows

Abtrusion Protector support

About Abtrusion Security

Security related news

Security links

 

Download Abtrusion Protector

 

Information for

> Corporate Management

> System Administrators

> Security Professionals

> Software Developers

> Home Users

Anatomy of a Hacker Attack

Phase 5 - Stealing or Modifying Information

To steal or somehow modify information is probably the primary goal of the hacker. There are also instances of hooliganism, but they are less common. A professional hacker will probably have a goal other than destruction. Sometimes, he will break in to one network only to use it as a base from which to attack his next target, but sooner or later he will want something.

With the right privileges and ample information about the target, stealing information is usually a piece of cake.

 

Single-page view

<< Previous            Next >>

Copyright 2002 Abtrusion Security AB. All rights reserved. This document may be reproduced provided that it is reproduced in its entirety and that this copyright message is retained.