O'Reilly logo

Advanced Persistent Security by Araceli Treu Gomes, Ira Winkler

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 5

How to Hack Computers

Abstract

The term hacking is vague, but for the context of this book, we refer to the process as gaining illicit access to a computer or network. There are fundamentally two ways to hack a computer asset: to take advantage of poorly configured and maintained systems and to take advantage of vulnerabilities built into the software or hardware.

Security researchers have a place in this process by attempting to find unknown vulnerabilities in computer products. Proper cyber hygiene would prevent most hacking attempts; however, cyber hygiene is not properly implemented in most organizations.

Keywords

Cross-site scripting; Hacking; Heartbleed; Security researchers; Software; Vulnerability life cycle; Vulnerabilities
This content ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required