19.04.2013 Views

2KKUU7ita

2KKUU7ita

2KKUU7ita

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 2<br />

Cracking the Hacker Mindset<br />

In This Chapter<br />

▶ Understanding the enemy<br />

▶ Profiling hackers and malicious users<br />

▶ Understanding why attackers do what they do<br />

▶ Examining how attackers go about their business<br />

B efore you start assessing the security of your systems, you may want to<br />

know something about the people you’re up against. Many information<br />

security product vendors and other professionals claim that you should protect<br />

your systems from the bad guys — both internal and external. But what<br />

does this mean? How do you know how these people think and work?<br />

Knowing what hackers and malicious users want helps you understand how<br />

they work. Understanding how they work helps you to look at your information<br />

systems in a whole new way. In this chapter, I describe the challenges<br />

you face from hackers, the people actually doing the misdeeds, and their<br />

motivations and methods. This understanding better prepares you for your<br />

ethical hacking tests.<br />

What You’re Up Against<br />

Thanks to sensationalism in the media, public perception of hacker has transformed<br />

from harmless tinkerer to malicious criminal. Nevertheless, hackers<br />

often state that the public misunderstands them, which is mostly true. It’s<br />

easy to prejudge what you don’t understand. Unfortunately, many hacker<br />

stereotypes are based on misunderstanding rather than fact, and that misunderstanding<br />

fuels a constant debate.<br />

Hackers can be classified by both their abilities and their underlying motivations.<br />

Some are skilled, and their motivations are benign; they’re merely<br />

seeking more knowledge. At the other end of the spectrum, hackers with<br />

malicious intent seek some form of personal gain. Unfortunately, the negative<br />

aspects of hacking usually overshadow the positive aspects and promote the<br />

negative stereotypes.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!