资源描述:
《pentest red teamingthe art of ethical hacking外语英文电子书》由会员上传分享,免费在线阅读,更多相关内容在教育资源-天天文库。
1、GIACSecurityEssentialsCertification(GSEC)SANSPracticalassignmentVersion1.4b–Option1Submittedby:ChrisPeakeDate:July16,2003Version1.0RedTeaming:TheArtofEthicalHackingBy2003,oureconomyandnationalsecuritybecamefullydependentuponinformationtechnologyandtheinformationi
2、nfrastructure.Anetworkofnetworksdirectlysupportstheoperationofallsectorsofoureconomy—energy(electricpower,oilandgas),transportation(rail,air,merchantmarine),financeandbanking,informationandtelecommunications,publichealth,emergencyKeyfservices,water,chemical,defen
3、seindustrialbase,food,agriculture,andpostalandshipping.Theingerprint=AF19FA272F94998DFDB5DE3DF8B506E4A1694E46reachofthesecomputernetworksexceedstheboundsofcyberspace.Theyalsocontrolphysicalobjectssuchaselectricaltransformers,trains,pipelinepumps,chemicalvats,andr
4、adars…Aspectrumofmaliciousactorscananddoconductattacksagainstourcriticalinformationinfrastructures.OfprimaryconcernisthethreatoforganizedcyberattackscapableofcausingdebilitatingdisruptiontoourNation’scriticalinfrastructures,economy,ornationalsecurity…Cyberattacks
5、onU.S.informationnetworkscanhaveseriousconsequencessuchasdisruptingcriticaloperations,causinglossofrevenueandintellectualproperty,orlossoflife.Counteringsuchattacksrequiresthedevelopmentofrobustcapabilitieswheretheydonotexisttodayifwearetoreducevulnerabilitiesand
6、deterthosewiththecapabilitiesandintenttoharmourcritical1infrastructures.-TheNationalStrategytoSecureCyberspacesecurity:1.Aconditionthatresultsfromtheestablishmentandmaintenanceofprotectivemeasuresthatensureastateofinviolabilityfromhostileactsorinfluences.[JP1]2.W
7、ithrespecttoclassifiedmatter,theconditionthatpreventsunauthorizedpersonsfromhavingaccesstoofficialinformationthatissafeguardedintheinterestsofnationalsecurity.[AfterJP1]3.Measurestakenbyamilitaryunit,anactivityorinstallationtoprotectitselfagainstallactsdesignedto
8、,orwhichmay,impairitseffectiveness.[JP1]–www.atis.org2INTRODUCTIONTheterm“hacker”wasinitiallyusedforskilledcomputerenthusiaststhatcould“hack”theirwaythroughtec