Security analysers: administrator assistants or hacker helpers?

نویسندگان

  • Steven Furnell
  • Pelagia Chiliarchaki
  • Paul Dowland
چکیده

Security analyser tools provide a means of automatically identifying, and potentially exploiting, vulnerabilities within computer systems and networks. Although such tools are useful to system administrators, in order to highlight and overcome weaknesses in protection, they are also of assistance to hackers looking for ways to break in. The paper highlights the range of tools that are currently available (and of potential use to both audiences) and considers the extent to which each group is likely to benefit from them in practice. It is considered that the ease of use of tools such as Back Orifice 2000 provide a means by which even the relatively unskilled hacker may inflict damage upon a system. Although it can be argued that the tools are generally equally available to hackers and administrators, the hacker community is likely to be more aware of the opportunities available. Even where they are aware of the existence of particular tools, survey results presented in the paper indicate that system administrators make relatively limited use of them. Factors that may account for this include their overall workload and lack of security awareness. Appropriate countermeasures can be identified to combat the individual categories of tool, but the problem of ensuring that these safeguards are implemented still remains.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Research Directions for Network Intrusion Recovery

One of the most significant unsolved problems for network managers and system administrators is how to repair a network infrastructure after discovering evidence of an extensive compromise. The technical issues are compounded by a breathtaking variety of human factors. We highlight lessons learned from three real, significant, and recent intrusion incidents. We do so as a way to expose the diff...

متن کامل

Pushing Boulders Uphill: The Difficulty of Network Intrusion Recovery

One of the most significant unsolved problems for network managers and system administrators is how to repair a network infrastructure after discovering evidence of an extensive compromise. The technical issues are compounded by a breathtaking variety of human factors. We present a study of three significant compromises of a medium-scale network infrastructure. We do so as a way to expose the d...

متن کامل

Live Devices: Insider Threat to Resources

Gray Hat hackers/Insider can use Live Linux distribution to get into the resources of primary/secondary installed Operating system. By using such devices and distributions they can access the critical point of an Operating system which make them able to control User/Critical files that cannot be accessed within the operating system or can accessed either by Administrator or Operating system due...

متن کامل

Network Randomization Protocol: A Proactive Pseudo-Random Generator

A major security threat to any security solutions based on a centralized server is the possibility of an adversary gaining access to and taking control of the server The adversary may then learn secrets cor rupt data or send erroneous messages In practice such an adversary may be more prevalent than one would like to admit It may be a malicious hacker a virus in an application program or an uns...

متن کامل

Hiring Ex-Criminal Hackers

Suppose someone applies for a system administrator job, or, better yet, an open slot on your computer security team. The applicant is eminently qualified for the position, having wizard-like skills on the exact operating systems deployed throughout your organization. You need his skills, big time. However, the candidate poses a bit of a problem. This otherwise-stellar applicant has a bit of a s...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Inf. Manag. Comput. Security

دوره 9  شماره 

صفحات  -

تاریخ انتشار 2001