First page Back Continue Last page Summary Graphics

Security Myths

  • Before continuing, we need to dispel a few myths:
  • "I don't have anything a cracker would want." You have a system on the Internet. This can give malicious entities a tool for relaying spam or as a jumping off point for other attacks. They can use your system as a zombie for a distributed denial- of-service, as happened in February, 2000. Your system could be a target of industrial espionage, especially if you telecommute. (It is easier to break into a Windows box hanging on a cablemodem than going through an enterprise firewall.) A cracker could be after the experience or the thrill ride. They may be practicing for larger targets. Sometimes, they are merely curious or break in simply because the host is vulnerable. Some may be curious about security and not using the right avenues to learn.

    Notes: