Catapults and Grappling Hooks: The Tools and Techniques of Information Warfare

نویسنده

  • Alan Boulanger
چکیده

For years, "hackers" have broken into computer systems, and now an entire industry is dedicated to computer network security. Both hackers and computer security professionals have developed software tools for either breaking into systems or identifying potential security problems within computer networks. This software can be found on compromised systems as well as within the toolkits of legitimate "tiger" teams that operate with the consent of the network owners. This paper describes some of the current techniques and tools employed by the hacker underground in breaching the security of networked computers, focusing primarily on UNIX®-based hosts connected to TCP/IP networks. As organizations become increasingly dependent on computer network technology, they also become increasingly vulnerable to losses, of both financial resources and reputation, resulting from security breaches within their computer and communications infrastructure. Many of the federally funded organizations dedicated to computer security issues were formed in response to attacks on computer systems. One of the first groups, Carnegie Mellon University's Computer Emergency Response Team (CERT[1]), was formed following an incident in which thousands of computers connected to the Internet were broken into and many disabled. This was the result of a self-replicating computer program, developed by Robert T. Morris at Cornell University, commonly referred to as the "Internet Worm."[2,3] Computer security has become a serious issue. The media have reported a substantial number of recent attacks on high profile sites, and the number of reported security-related incidents is on the rise. In 1996 the United States Department of Defense (DoD) reported an estimate of 250 000 attacks per year on its computer system and stated that the rate of attack is increasing by 100 percent annually.[4] Page 1 of 11 Catapults and grappling hooks: The tools and techniques of information warfare 8/25/01

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Survey on the Principles and Techniques of Gynecology and Obstetrics Surgery in the Islamic Period (From the 3rd to the 12th Century AH. / 9th to 18th Century AD.)

Surgical science is one of the important aspects of traditional medicine in the Islamic period. By reviewing the compilations in the field of gynecology and obstetrics some common and well-documented principles can be traced that have been accepted by the majority of surgeons as the fixed rules. The extraction of these principles is the first issue and the examination of gynecological surgery t...

متن کامل

A qualitative study on personal information management (PIM) in clinical and basic sciences faculty members of a medical university in Iran

  Background: Personal Information Management (PIM) refers to the tools and activities to save and retrieve personal information for future uses. This study examined the PIM activities of faculty members of Iran University of Medical Sciences (IUMS) regarding their preferred PIM tools and four aspects of acquiring, organizing, storing and retrieving personal information.   Methods : The qualita...

متن کامل

Analyzing and Investigating the Use of Electronic Payment Tools in Iran using Data Mining Techniques

In today's world, most financial transactions are carried out using done through electronic instruments and in the context of the Information Technology and Internet. Disregarding the application of new technologies at this field and sufficing to traditional ways, will result in financial loss and customer dissatisfaction. The aim of the present study is surveying and analyzing the use of elect...

متن کامل

Preparation and Utilization of MnO2 Nanoparticles (NPs) Catalyst for the Decontamination against Chemical Warfare Nerve Agent Simulant (CWNAS)

In this scientific research, MnO2 nanoparticles (NPs) have been successfully prepared by a precipitation method using KMnO4, MnSO4.H2O and H2O2 (30%) as the precursors. As-prepared sample was identified by X-ray diffraction (XRD), Scanning electron microscopy (SEM), Transmission electron microscopy (TEM) and Infrared (IR) techniques. The transmission electron microscopy (TEM) showed 7-8 nm rang...

متن کامل

شناسایی مرحله لاروی تنیا هیداتیژنا (سیستی سرکوس تنیو کولیس) بر اساس خصوصیات مرفولوژیکی قلاب های رستلومی

Background and purpose: Taxonomic identification of larval and adult stages of Taenia hydatigena from other Taenia species based on morphometric characteristics of the rostellar hooks in intermediate and definitive host is important in medical and veterinary parasitology. Therefore, this study aimed at identifying the larval stage of Taenia hydatigena (Cysticercus tenuicollis) based on mor...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • IBM Systems Journal

دوره 37  شماره 

صفحات  -

تاریخ انتشار 1998