Home > Articles

Hackers and Crackers

  • Print
  • + Share This
This chapter is from the book

This chapter is from the book

Summary

This chapter covered a variety of topics, including passive OS fingerprinting, social engineering, tools, and the SANS Top 20. Hopefully after reading this chapter you can grasp the thinking and the process a cracker will go through to obtain access to a network. With cybercrime on the rise, protecting yourself and your information will become more challenging. Knowing how a hacker/cracker works can assist you in protecting yourself against these people. As Bruce Schneier of CTO Counterpane Internet Systems says, "Security is a process, not a product." As for the products you do have, remember to apply the latest patches and disable the services you don't need.

  • + Share This
  • 🔖 Save To Your Account