Beruflich Dokumente
Kultur Dokumente
2
List Phases of a Computer Attack
This paper defines the general phases of a computer attack and lists the factors taken into
consideration when an attacker is planning, in the process of attacking or completing an attack
on computers and/or networks.
The first step involved in a computer attack would be to determine what computer or
network can be attacked. This step is called Reconnaissance and Probing. The attacker
collects all the information about a target computer/network. They would possible used the
following tools to perform initial probing and inspection of the target:
tools within the TCP/IP protocol suite, 2) Standard and customized SNMP
tools 3) Port scanners and port mappers and 4) Security probes.
In the
They might
3
The Last Phase is to Cover Your Tracks. This is important to remove
any traces of the attack by removing files that may have been created
and/or removing any log file entries
4
References
Microsoft. (2014, January). Security. Retrieved from Microsoft Technical Network:
https://technet.microsoft.com/library/security/ms14-002
Microsoft. (2015). Security Tech Center. Retrieved from Microsoft Security Advisories:
https://technet.microsoft.com/security/advisory