Know the five stages, used by hackers, to break into networks and penetrate!
The biggest challenge for security company executives is to think like a hacker. In fact, penetration techniques used by hackers and hackers evolve every year, but their methods remain the same for decades.
"Every manager of corporate security and security should know how to think and behave as a first step in order to maintain a secure network," said Bruno Zannie, director of systems engineering at McAfee. According to him, there are six stages which are often used by hackers to circumvent the systems of companies and organizations.
1. Gather information, this is the first stage of hackers when they plan to launch an attack on a particular company or network. The first thing they do is choose the target company and locate the attack, then start collecting "IP" addresses and important profile names where corporate data can be stored.
2. Exploration, after a complete list of employees and profiles to be targeted, the survey is initiated. This includes checking for certain security holes or specific programs that are out of date or have untreated security problems.
3. Attack, after finding an entry point, the hacker starts to take advantage of vulnerabilities or security holes in one of the programs or technologies used. And not only on this side, but are looking for ways to expand the attack within the network.
4.The penetration, after being able to enter into one of the devices comes the stage of penetration, through the creation of user profiles and access privileges and powers to spread in other devices and the widest possible.
5. Theft The final step in the hacker attack is the looting and theft of all the important information they have found. Unlike the pirates in the past who are just sabotaging the website. Hackers are now much more important, looking for credit card data, business secrets, personal information and customer information. Everything they steal is used for their own benefit.
"Every manager of corporate security and security should know how to think and behave as a first step in order to maintain a secure network," said Bruno Zannie, director of systems engineering at McAfee. According to him, there are six stages which are often used by hackers to circumvent the systems of companies and organizations.
1. Gather information, this is the first stage of hackers when they plan to launch an attack on a particular company or network. The first thing they do is choose the target company and locate the attack, then start collecting "IP" addresses and important profile names where corporate data can be stored.
2. Exploration, after a complete list of employees and profiles to be targeted, the survey is initiated. This includes checking for certain security holes or specific programs that are out of date or have untreated security problems.
3. Attack, after finding an entry point, the hacker starts to take advantage of vulnerabilities or security holes in one of the programs or technologies used. And not only on this side, but are looking for ways to expand the attack within the network.
4.The penetration, after being able to enter into one of the devices comes the stage of penetration, through the creation of user profiles and access privileges and powers to spread in other devices and the widest possible.
5. Theft The final step in the hacker attack is the looting and theft of all the important information they have found. Unlike the pirates in the past who are just sabotaging the website. Hackers are now much more important, looking for credit card data, business secrets, personal information and customer information. Everything they steal is used for their own benefit.
Post a Comment