What are the 4 steps involved in a hacker attack?
What will be an ideal response?
There are generally four steps involved in a hacker attack: (1) information gathering;
(2) initial access; (3) privilege escalation; and (4) creating back doors and covering tracks.
In order to break into a system, hackers first need to gather information. Information gathering
involves “footprinting,” where the hacker tries to gain as much information about the target and
existing computer security, oftentimes scanning the computer system for ways to access it, and
probing the system (called enumeration) to see if user accounts and network resources are not
well protected. Following information gathering, the threat then usually performs an initial
access which can involve the installation of malicious codes to gain entry into a system. Once in
the system, unauthorized users can expand their privilege or access to other information (called
root compromise), oftentimes using malicious codes again to achieve their criminal purposes. In
the last stage, the hackers create back doors so they can readily gain access to the system again.
One common back door technique includes creating a user account so hackers can readily re-
access the system. In order to ensure not being detected, hackers also need to “cover their
tracks” from being detected by system administrators. This can be accomplished by deleting or
modifying logs, and disguising the malicious code.
You might also like to view...
What are some of the problems that may confound effective intervention for many female offenders?
What will be an ideal response?
Answer the following statement(s) true (T) or false (F)
1. Quotas are a type of biased enforcement. 2. Although unethical, quotas are not illegal. 3. Some view quotas as a way to ensure productivity from officers. 4. Rating officers on how many tickets they write and how many arrests they make each month has a direct effect on biased enforcement practices. 5. The most important guide for officers as they make their decisions is ethics.
Answer the following statement(s) true (T) or false (F)
1. Global Positioning System (GPS) technology for probation began in 1995 in the state of Florida. 2. Data from the Bureau of Labor Statistics (2017) indicated 63.8% of all probation officers are African American. 3. Probation is a sanction that serves to reduce prison overcrowding. 4. The presentence investigation (PSI) report is typically the final point of assessment and is rarely utilized when the offender is first brought into a prison facility. 5. The judge often is not the primary decision maker with regard to an offender’s sentencing and/or the granting of probation.
The assistant warden for programming is typically someone who has been promoted through the ranks, beginning perhaps as a caseworker
a. True b. False Indicate whether the statement is true or false