What Is a System Compromise?

We have discussed why you are attacked. You can be a target because of monetary gain by the attacker, the usefulness of your system to hide tracks and be used in further attacks, or for fun or malicious purposes. The end result of a successful attack is that the attacker has compromised your system security and has control of your computer, network, or applications. If an attacker is just going after data in an application, such as all your financial information in Quicken files, he doesn't need complete control of the system as long as he obtains the data.

Hackers, crackers, script kiddies or just about anyone on the Internet can launch an attack against your system in an attempt to compromise your computer. Anyone ...

Get Privacy Defended: Protecting Yourself Online now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.