Methods of Attacks on Risk Access Spots: Online Information Warfare
This chapter presents a pedagogical view of the methods employed by attackers, hackers, electronic criminals in exploiting vulnerable systems as reviewed and discussed in chapter 5. The methods of attack also include a wide range of common techniques for penetration testing usually adopted to expose risk access spots on electronic and on-line business communication networks. The methods for attack centres on transmission media (Wired and Wireless spectrum, Service Access Points (SAP), Routing Table & IP address, Port and Port number, MAC address, Server, User Profiles, Cyphertext and Crypto-systems and Operating Systems highlighted in previous chapter. The defence and management strategies for handling these attacks on a communication network have been presented in chapters 4, 7, 8 and 9.
KeywordsDictionary Attack Address Resolution Protocol Mobile Code Online Business Service Access Point
Unable to display preview. Download preview PDF.