2007 | OriginalPaper | Chapter
Methods of Attacks on Risk Access Spots: Online Information Warfare
Published in: Online Business Security Systems
Publisher: Springer US
Activate our intelligent search to find suitable subject content or patents.
Select sections of text to find matching patents with Artificial Intelligence. powered by
Select sections of text to find additional relevant content using AI-assisted search. powered by
This chapter presents a pedagogical view of the methods employed by attackers, hackers, electronic criminals in exploiting vulnerable systems as reviewed and discussed in chapter 5. The methods of attack also include a wide range of common techniques for penetration testing usually adopted to expose risk access spots on electronic and on-line business communication networks. The methods for attack centres on transmission media (Wired and Wireless spectrum, Service Access Points (SAP), Routing Table & IP address, Port and Port number, MAC address, Server, User Profiles, Cyphertext and Crypto-systems and Operating Systems highlighted in previous chapter. The defence and management strategies for handling these attacks on a communication network have been presented in chapters 4, 7, 8 and 9.