Understanding Internet risks
Risks from hackers
126
1
Initial access
The hacker exploits a vulnerability found during information
gathering and establishes an entry point into your computer.
1
Privilege escalation
The hacker gains access to more programs and
services
on your
computer.
1
Covering tracks
The hacker hides or removes evidence of the intrusion, sometimes
leaving an entry point open for return.
Information gathering
The first step in information gathering is acquiring a target. A hacker can
choose a person or company to attack, or search the Internet for an
unprotected target that will be easy to hack. The amount of information
available about you on the Internet is directly related to your level of Web
presence. If you have a
domain
name and a Web site, more information is
publicly available than would be if you only had an
address.
If a hacker has chosen a specific target, such as a company or organization,
many resources on the Internet assist in gathering information. Using the
Internet, a hacker can learn a lot about a potential target. Given a domain
name, it’s easy to find out the name and address of the owner, as well as
the name and phone number of the administrative and technical contacts.
While this information usually can’t be used directly to attack a network or
computer, it can be used to gather more information.
If a hacker doesn’t have a specific target in mind, many tools are available
for scanning the Internet and finding possible targets. The simplest scan is
a ping scan, which can quickly scan thousands of computers. The hacker
uses a program to ping computers at a series of IP addresses. A response
tells the hacker that a computer exists at an IP address. When Norton
Personal Firewall is running, your computer is hidden from ping scans
because your computer does not respond. The hacker does not learn that
there is a computer at your IP address by pinging it.
Port scans
are more comprehensive and are usually performed on single
computers. A port scan can tell a hacker which services are running, such
as HTTP and FTP. Each service that is running provides a potential entry
point for the hacker. On unprotected computers, unused ports respond that
they are closed, telling the hacker that a computer exists at that IP address.
Norton Personal Firewall does not respond to scans of unused ports, giving
them a
stealth
appearance.
Содержание Norton Personal Firewall 2003
Страница 1: ...User s Guide ...
Страница 10: ...Contents 10 Glossary Service and support solutions Index CD Replacement Form ...
Страница 14: ...Responding to emergencies Prevent future problems 14 ...
Страница 60: ...Keeping current with LiveUpdate Run LiveUpdate automatically 60 ...
Страница 102: ...Blocking Internet advertisements Use text strings to identify ads to block or permit 102 ...
Страница 116: ...Troubleshooting Norton Personal Firewall Troubleshoot Norton Personal Firewall problems 116 ...
Страница 140: ...Glossary 140 ...
Страница 144: ...Service and support solutions 144 ...
Страница 150: ...Index 150 Z zombie programs 71 132 zones 62 64 adding computers to 63 Restricted 88 Trusted 71 ...