P. 1
Hacker Attack

Hacker Attack

|Views: 415|Likes:
Published by dangkyne

More info:

Published by: dangkyne on Mar 17, 2010
Copyright:Attribution Non-commercial


Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less






Some companies have taken an approach that involves hiring outsiders to simulate a
hacker attack.The idea is to see how much damage they can do (without actually stealing
real data or trashing real hard drives).Can these faux hackers get in? Can they,once in,
get access to sensitive information and make off with it? Could they execute file-deletion

Such a hired “hacker”is called a sneaker.A sneaker is someone hired to attempt to
get into a system,to test its defenses.A group of sneakers is known as a tiger team
(from the military term describing a group of soldiers who try to physically break into
secure installations).

This technique can be very useful as a way of identifying weaknesses,though it’s no
substitute for the vigilance available from 24/7 monitoring services.

You're Reading a Free Preview

/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->