Hack proofing your network : internet tradecraft /

Other Authors: Russell, Ryan
Format: Book
Language:English
Published: United States of America : Syngress, c2000.
Subjects:
Table of Contents:
  • Theory and Ideals
  • Politics
  • Definitions of the Word Hacker
  • Hacker
  • Cracker
  • Script Kiddie
  • Phreak
  • White Hat/Black Hat
  • Grey Hat
  • Hacktivism
  • The Role of the Hacker
  • Criminal
  • Magician
  • Security Professional
  • Consumer Advocate
  • Civil Rights Activist
  • Cyber Warrior
  • Motivation
  • Recognition
  • Admiration
  • Curiosity
  • Power and Gain
  • Revenge
  • Legal/Moral Issues
  • What's Illegal
  • Reasonably Safe
  • What's Right?
  • Exceptions?
  • The Hacker Code
  • Public vs. Private Research
  • Who Is Affected when an Exploit Is Released?
  • Laws of Security
  • What Are the Laws of Security?
  • Client-side Security Doesn't Work
  • Applying the Law
  • Exceptions
  • Defense
  • You Can't Exchange Encryption Keys without a Shared Piece of Information
  • Applying the Law
  • Exceptions
  • Defense
  • Viruses and Trojans Cannot Be 100 Percent Protected Against
  • Applying the Law
  • Exceptions
  • Defense
  • Firewalls Cannot Protect You 100 Percent from Attack
  • Applying the Law
  • Social Engineering
  • Attacking Exposed Servers
  • Attacking the Firewall Directly
  • Client-side Holes
  • Exceptions
  • Defense
  • Secret Cryptographic Algorithms Are Not Secure
  • Applying the Law
  • Exceptions
  • Defense
  • If a Key Isn't Required, You Don't Have Encryption; You Have Encoding
  • Applying the Law
  • Exceptions
  • Defense
  • Passwords Cannot Be Securely Stored on the Client Unless There Is Another Password to Protect Them
  • Applying the Law
  • Exceptions
  • Defense.