Survey of network weapons part 1: weapons for profiling

  • Authors:
  • Linda S. Grubb;Luis Cuéllar

  • Affiliations:
  • McNeese State University;McNeese State University

  • Venue:
  • Journal of Computing Sciences in Colleges
  • Year:
  • 2004

Quantified Score

Hi-index 0.00

Visualization

Abstract

The rise of the Internet has been a boon for Computer Science and the world economy. It has redefined the way technology and information is viewed. But it also has given rise to new types of crimes as well as to new types of criminals. These criminals organize themselves along familiar structures and hierarchies. These organizations share knowledge and develop tools and new weapons, which they use to breach the most sophisticated security mechanisms. This has made Information Security a must for anyone entrusted to safeguard information. Knowledge of the hacker's tools becomes essential for anyone to be able to defend against these criminals. Since interestingly these tools are also used in network management, they are easily found, and often fall into the hands of students and shady persons. Taking a proactive approach by education may counteract this threat, since the best defense is to be well educated and knowledgeable of the risks and threats associated with common network tools.