• Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint
Share this Page URL
Help

Chapter 16. Guarding Your System Against Hacking > What Is a System Compromise?

What Is a System Compromise?

We have discussed why you are attacked. You can be a target because of monetary gain by the attacker, the usefulness of your system to hide tracks and be used in further attacks, or for fun or malicious purposes. The end result of a successful attack is that the attacker has compromised your system security and has control of your computer, network, or applications. If an attacker is just going after data in an application, such as all your financial information in Quicken files, he doesn't need complete control of the system as long as he obtains the data.

Hackers, crackers, script kiddies or just about anyone on the Internet can launch an attack against your system in an attempt to compromise your computer. Anyone can be a threat. It doesn't matter who takes control of your computer because of a security weakness. The result is that you can be compromised, all your data can be stolen, and all your files can be destroyed at will by an attacker.


PREVIEW

                                                                          

Not a subscriber?

Start A Free Trial


  
  • Creative Edge
  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint