15.04.2018 Views

programming-for-dummies

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

638<br />

Stopping Hackers<br />

To help identify potential hackers, many system administrators rely on a special<br />

program called a honeypot, which acts like a trap to snare hackers. A honeypot<br />

creates an entirely phony part of a computer network and loads it with<br />

tempting, but fake data, such as blueprints <strong>for</strong> a new weapon, a list of Social<br />

Security numbers, or usernames and passwords of nonexistent employees.<br />

No authorized users would ever need to browse though the fake files of a<br />

honeypot because authorized users won’t know the honeypot even exists.<br />

The moment anyone accesses the phony honeypot files, the IDS can<br />

positively identify that user as an intruder.<br />

A honeypot isolates an intruder into a fictional part of the computer network<br />

where he (or she) can’t cause any damage. However, after a hacker has<br />

accessed a computer network, system administrators have two problems.<br />

One, they have to find a way to keep the intruder out. Two, they need to<br />

make sure the intruder can never get back in.<br />

Rootkit detectors<br />

After breaking into a computer network, the hacker’s first goal is to plant a<br />

rootkit. A rootkit provides tools <strong>for</strong> covering the hacker’s tracks to avoid detection<br />

along with providing tools <strong>for</strong> punching holes in the computer network’s<br />

defenses from the inside. By installing a rootkit on a computer network, hackers<br />

insure that if one way into the network gets discovered, they still have half<br />

a dozen other ways to get right back into that same network all over again.<br />

Even if a honeypot isolates a hacker from sensitive areas of a network, the<br />

mere presence of a hacker means that some part of the network’s defenses<br />

has been breached. To insure that hackers can’t get back into a computer,<br />

system administrators need to rely on rootkit removal programs.<br />

Rootkit removal programs simply automate the process a computer expert<br />

would follow to look <strong>for</strong> and remove a rootkit from a network. Un<strong>for</strong>tunately,<br />

hackers develop new rootkits all the time, and one rootkit might hide in a<br />

different way than another rootkit. Rather than create a single rootkit<br />

removal program, system administrators often have to create custom rootkit<br />

removal programs.<br />

An IDS can find a hacker, and a rootkit removal program can detect and wipe<br />

out a rootkit from a network. For many companies, those two tasks alone are<br />

enough to keep an army of programmers busy. But if a company wants to<br />

take legal action against a hacker, they’ll need to provide evidence of the<br />

hacker’s activities, and that evidence falls under the category of <strong>for</strong>ensics.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!