Vērtējums:
Publicēts: 02.04.2006.
Valoda: Angļu
Līmenis: Vidusskolas
Literatūras saraksts: Nav
Atsauces: Nav
  • Eseja 'Securing Networks', 1.
  • Eseja 'Securing Networks', 2.
  • Eseja 'Securing Networks', 3.
Darba fragmentsAizvērt

Introduction
There have been many excellent papers, and books written on securing computer networks. They all largely address how to harden your network from the router on down to the switch, then eventually to the actual workstation itself. In many document cases of compromised networks, the end goal of the hacker was to suborn the actual workstation itself. The router, and sometimes a server of some kind, was not actually the end state of the hacker. It was normally to gain a toehold on the internal network via a client side exploit. …

Atlants