Passwords - System Issues: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
No edit summary |
||
Line 1: | Line 1: | ||
Basically there are '''four''' possibilities, how systems can be attacked in general: |
Basically there are '''four''' possibilities, how systems can be attacked in general: |
||
<br><br> |
<br><br> |
||
1. Attacking one account (The intruder tries to guess a specific password)<br> |
1. Attacking '' '''one''' '' account (The intruder tries to guess a specific password)<br> |
||
2. Attempt to penetrate any account (on a system) used to steal a service directly<br> |
2. Attempt to penetrate '' '''any''' '' account (on a system) used to steal a service directly<br> |
||
3. Attempt to penetrate any account on any system to gain access (for example to hide pirated software or pornography)<br> |
3. Attempt to penetrate '' '''any''' '' account on '' '''any''' '' system to gain access (for example to hide pirated software or pornography)<br> |
||
4. Service Denial Attack (The intruder tries to prevent the legitimate user from using the system)<br> |
4. ''Service Denial Attack'' (The intruder tries to prevent the legitimate user from using the system)<br> |
||
<br><br> |
<br><br> |
||
Latest revision as of 20:54, 8 November 2004
Basically there are four possibilities, how systems can be attacked in general:
1. Attacking one account (The intruder tries to guess a specific password)
2. Attempt to penetrate any account (on a system) used to steal a service directly
3. Attempt to penetrate any account on any system to gain access (for example to hide pirated software or pornography)
4. Service Denial Attack (The intruder tries to prevent the legitimate user from using the system)
Back (A Bad Mnemonic System) | Table of Contents | Next (Protecting Oneself Or Others?)