tailieunhanh - Hacking FOR DUMmIES phần 3

nó sẽ dẫn chúng ta tin tưởng rằng chương trình mã hóa được sử dụng trong Cisco IOS loại 7 mật khẩu không phải là rất mạnh minh làm thế nào để tạo mật khẩu an toàn. Bạn có thể muốn đề cập đến chúng như mã vượt qua hoặc cụm từ vượt qua | Chapter 5 Social Engineering Jn This Chapter Introducing social engineering Examining the ramifications of social engineering Understanding social-engineering techniques Protecting your organization against social engineering ocial engineering takes advantage of the weakest link in any organization s information-security defenses the employees. Social engineering is people hacking and involves maliciously exploiting the trusting nature of human beings for information that can be used for personal gain. Social Engineering 101 Typically hackers pose as someone else to gain information they otherwise can t access. Hackers then take the information obtained from their victims and wreak havoc on network resources steal or delete files and even commit industrial espionage or some other form of fraud against the organization they re attacking. Social engineering is different from physical-security issues such as shoulder surfing and dumpster diving but they are related. Here are some examples of social engineering False support personnel claim that they need to install a patch or new version of software on a user s computer talk the user into downloading the software and obtain remote control of the system. False vendors claim to need to make updates to the organization s accounting package or phone system ask for the administrator password and obtain full access. False contest Web sites run by hackers gather user IDs and passwords of unsuspecting contestants. The hackers then try those passwords on other Web sites such as Yahoo and and steal personal or corporate information. 56 Part II Putting Ethical Hacking in Motion False employees notify the security desk that they have lost their keys to the computer room are given a set of keys and obtain unauthorized access to physical and electronic information. Sometimes social engineers act as forceful and knowledgeable employees such as managers or executives. Other times they may play the roles of extremely .

TỪ KHÓA LIÊN QUAN