I have to admit though the defensive steps weren’t awfully informative since some were either really vague (“Apply proper router and firewall filtering.”) or just common sense (“Keep systems updated with the latest security patches.”).
Very true! The text we use is very basic when it comes to specifics. Honestly, much of this is below my experience level. I must admit, even though I can configure the equipment, I never fully understood the workings below. It is good info either way, I just wish we had more on hands experience.
Wall of text since I can’t attach this one:
Categories of Attackers
Who attacks wireless LANs and other systems? There are six different categories of attackers.
These include:
Hackers?Although the term ?hacker? is commonly used in a generic sense of
anyone who illegally breaks into a computer system, a hacker is often described as
a person who uses his or her advanced computer skills to attack computers but not
with a malicious intent. Instead, hackers use their skills to expose security flaws.
Hackers like to think of themselves ?ethical attackers.?
Crackers?A cracker is a person who violates system security with malicious intent.
Like hackers, crackers have advanced knowledge of networks and the skills to exploit
them. Unlike ethical hackers who claim to be only searching for security weaknesses,
crackers destroy data, deny service to legitimate users, or otherwise cause serious
problems on computers and networks. Crackers can be identified by their malicious
actions: they intend to do harm to any computer they can break into.
Script kiddies?Much like crackers, script kiddies want to break into computers to
create damage. However, whereas crackers have an advanced knowledge of computers
and networks, script kiddies are unskilled or novice users. Script kiddies do
their work by downloading free automated attack software fromWeb sites and then
using it to break into computers and networks. While script kiddies lack the
technical skills of crackers, they are sometimes considered more dangerous. Script
kiddies tend to be young and have a great deal of leisure time, which they can use
to attack systems.
Spies?A computer spy is a person who has been hired to break into a computer
and steal information. Spies do not randomly search for unsecured computers to
attack as script kiddies, crackers, and hackers do. Rather, spies are hired to attack a
specific computer that contains sensitive information. Their goal is to break into
that computer and take the information without drawing any attention to their
actions. Spies, like hackers and crackers, possess excellent computer skills.
Employees?One of the largest information security threats to an organization
actually comes from an unlikely source: its employees. There are a variety of
reasons employees may attack their company?s system. Like hackers, employees
might want to show the company a weakness in their security. Employees might
feel that they have been overlooked in a promotion and, like a script kiddie,want
to say,?I?m smarter than all of you.? Like spies, employees could be motivated by
money. For example, a competitor might approach an employee they think is
vulnerable and offer money in exchange for information.
Cyberterrorists?Terrorism has become a major security concern around the world.
Using airplanes, trains, cars, and even their own bodies, terrorists attempt to harm
as many innocent civilians as possible, causing widespread panic and disrupting
normal society. Many security experts fear that terrorists will turn their attacks to
the network and computer infrastructure. Known as cyberterrorists, their motivation
may be defined as ideology, or attacking for the sake of their principles or
beliefs.