Copyright 2002 by
Prentice Hall, Inc.
8-
16
n
Approaches hackers use:
n
Cracking the password
n
Tricking someone
n
Network sniffing
n
Misusing administrative tools
n
Playing middleman
n
Denial of service
n
Trojan horse
n
Viruses
n
Spoofing
Security in the Internet Age:
Hacking