Every breach of computer security is different, depending on the skills of the attacker and the defenses in your system. But most hackers follow the same four basic steps to perpetrate an attack — profiling, scanning, enumerating and exploiting. Here’s how each step works, according to Michael T. Raggo, a senior security consultant for Verisign. The steps apply to a corporate computer network, but the basic principles could be used against any computer hooked to the Internet. In the profiling, or footprinting, phase of the attack, the hacker gathers as much information as possible about your computer network and its security, including the physical site and hardware. Insiders who already work for the company have an obvious advantage, but much of the information used for profiling is publicly available on the Internet. Full Story
About OODA Analyst
OODA is comprised of a unique team of international experts capable of providing advanced intelligence and analysis, strategy and planning support, risk and threat management, training, decision support, crisis response, and security services to global corporations and governments.