Hack proofing your network : internet tradecraft /
Other Authors: | |
---|---|
Format: | Book |
Language: | English |
Published: |
United States of America :
Syngress,
c2000.
|
Subjects: |
Table of Contents:
- Theory and Ideals
- Politics
- Definitions of the Word Hacker
- Hacker
- Cracker
- Script Kiddie
- Phreak
- White Hat/Black Hat
- Grey Hat
- Hacktivism
- The Role of the Hacker
- Criminal
- Magician
- Security Professional
- Consumer Advocate
- Civil Rights Activist
- Cyber Warrior
- Motivation
- Recognition
- Admiration
- Curiosity
- Power and Gain
- Revenge
- Legal/Moral Issues
- What's Illegal
- Reasonably Safe
- What's Right?
- Exceptions?
- The Hacker Code
- Public vs. Private Research
- Who Is Affected when an Exploit Is Released?
- Laws of Security
- What Are the Laws of Security?
- Client-side Security Doesn't Work
- Applying the Law
- Exceptions
- Defense
- You Can't Exchange Encryption Keys without a Shared Piece of Information
- Applying the Law
- Exceptions
- Defense
- Viruses and Trojans Cannot Be 100 Percent Protected Against
- Applying the Law
- Exceptions
- Defense
- Firewalls Cannot Protect You 100 Percent from Attack
- Applying the Law
- Social Engineering
- Attacking Exposed Servers
- Attacking the Firewall Directly
- Client-side Holes
- Exceptions
- Defense
- Secret Cryptographic Algorithms Are Not Secure
- Applying the Law
- Exceptions
- Defense
- If a Key Isn't Required, You Don't Have Encryption; You Have Encoding
- Applying the Law
- Exceptions
- Defense
- Passwords Cannot Be Securely Stored on the Client Unless There Is Another Password to Protect Them
- Applying the Law
- Exceptions
- Defense.