Current Cyber Attack Methods

Current Cyber Attack Methods

Andrew Colarik (Consultant, New Zealand)
Copyright: © 2006 |Pages: 29
DOI: 10.4018/978-1-59904-021-9.ch005
OnDemand PDF Download:
$37.50

Abstract

Understand that cyber attacks are not random but instead are executed with deliberate intent and specific purpose. Ö Identify many of the internal penetration approaches to achieve security breaches. Ö Discover the most common external penetration tactics directed against systems. Ö Come to realize the part that people play in the breach of systems. Ö Recognize that there are many components that are vulnerable to attacks that are outside an individual’s or organization’s zone of control.

Complete Chapter List

Search this Book:
Reset
Table of Contents
Foreword
Henry B. Wolfe
Acknowledgment
Chapter 1
Introduction  (pages 1-13)
Andrew Colarik
Learn more about recent terrorist atrocities. Ö Identify the main sponsors of global terrorism today. Ö Comprehend the link between diminished... Sample PDF
Introduction
$37.50
Chapter 2
The Power of Terrorism  (pages 14-32)
Andrew Colarik
Create a foundational understanding of traditional terrorism in order to apply its goals, methods, and means to cyber terrorism. Ö Identify the key... Sample PDF
The Power of Terrorism
$37.50
Chapter 3
Andrew Colarik
Begin to discern the connection between terrorism and technology. Ö Understand the evolution from hackers to crackers, crackers to cyber criminals... Sample PDF
Cyber Terrorism Evolution
$37.50
Chapter 4
Andrew Colarik
Identify the major components of the global information infrastructure. Ö Begin to understand how communication network technologies are bringing... Sample PDF
Global Information Infrastructure
$37.50
Chapter 5
Andrew Colarik
Understand that cyber attacks are not random but instead are executed with deliberate intent and specific purpose. Ö Identify many of the internal... Sample PDF
Current Cyber Attack Methods
$37.50
Chapter 6
Attack Scenarios  (pages 111-146)
Andrew Colarik
Recognize that through global access to information, we are all potential targets. Ö Begin to understand just how much information that can be used... Sample PDF
Attack Scenarios
$37.50
Chapter 7
Thoughts for the Future  (pages 147-165)
Andrew Colarik
Briefly put the previous information presented into a context for taking action. Ö Understand the relationship between user privacy and data usage.... Sample PDF
Thoughts for the Future
$37.50
About the Author