Computer security (794212), страница 4
Текст из файла (страница 4)
A social status among hackers, elite is used to describe the most skilled. Newly discovered exploits will circulate among these hackers. Elite groups such as Masters of Deception conferred a kind of credibility on their members.
Script kiddie
A script kiddie (or skiddie) is a non-expert who breaks into computer systems by using pre-packaged automated tools written by others, usually with little understanding of the underlying concept.
Neophyte
A neophyte, "newbie" is someone who is new to hacking or phreaking and has almost no knowledge or experience of the workings of technology, and hacking.
Blue hat
A blue hat hacker is someone outside computer security consulting firms who is used to bug test a system prior to its launch, looking for exploits so they can be closed. Microsoft also uses the term BlueHat to represent a series of security briefing events.
Hacktivist
A hacktivist is a hacker who utilizes technology to announce a social, ideological, religious, or political message. In general, most hacktivism involves website defacement or denial-of-service attacks.
Bots
Bots are automated software tools, some freeware, that are available for the use of any type of hacker.
Conclusion
In conclusion I would like to summarize the main points.
Not all hackers are bad. There exist white hackers that do it not for malicious reasons. On the other hand not all hackers are really dangerous. Developers must seriously fear only elite hackers, but they must not forget about others.
We have also considered different types of attacks and vulnerabilities, so now we know from what we are defending ourselves. Developers can defend their software from many different attacks, but from some attacks, like fishing, only user by itself can defend. Vulnerabilities, like attacks, also divide on software and human vulnerabilities.
We have looked at automated means of doing attacks, this is malware. It can be extremely various types, using different vulnerabilities and producing different kinds of attacks
The next point is that computer security has many approaches that must be combined in different, very well-considered proportions, because in other case product will not be secure.
Another peculiarity of computer security is that it has special branch called network security. The problem with this direction is that it must have other methods for defense from attacks. And the biggest problem in it is that this defense often must provide users by themselves.
References
-
http://en.wikipedia.org/wiki/Computer_security
-
http://en.wikipedia.org/wiki/Network_security
-
http://en.wikipedia.org/wiki/Attack_(computing)
-
http://en.wikipedia.org/wiki/Vulnerability_(computing)
-
http://en.wikipedia.org/wiki/Hacker_(computer_security)
-
http://en.wikipedia.org/wiki/Malware