in this assignment, you need to pretend to be ethical hackers who need to protec
ID: 3633411 • Letter: I
Question
in this assignment, you need to pretend to be ethical hackers who need to protect their organization from a computer attack. List the general phases of a computer attack. Thinking like an attacker, you should add items to each phase that an attacker would consider when preforming a successful computer attack.
The phases of attack include:
Reconnaissance
Discovery
Fingerprinting
Targeting
Intrusion
Privilege escalation
snooping and eavesdropping
Remote access
Zombies
self assessment checklist
I have identifed at least 3 phases of a computer attack
in my answer i have included the factors the attackers take into consideration when targeting computers or networks
Explanation / Answer
Snooping/Eavesdrooping:
· Listens to the conversation
· Decode the conversation
· Monitor keystrokes and guess passwords
· Intercept the data transfers and emails
Finger printing:
· Availability of the host
· Network topology being used.
· Scan the port and listening to it
· Type of the OS being used in the system and its behavior
Intrusion:
· Having a close look and observation on the user
· Identifying the user’s behavior and guessing passwords
Related Questions
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.