1. Internet Nowadays
The hackers is using a well-based knowledge of the system he is using and possess the necessary programs to achieve his goal. 2.2: Social engineering: Although not directly related to cryptography (encryption of data), social engineering exploits the weakest point in most security systems, namely the people that use and maintain them. 2.3: Spoofing attacks: In such attacks, a person impersonates another persons identity (usually the system administrator's) to gain access to a data bank. 2.4: Packet alteration: Instead of spoofing an identity, an attacker may choose to manipulat...
- Word Count: 2550
- Approx Pages: 10
- Grade Level: Undergraduate