Title :
Hacking Tricks Toward Security on Network Environments
Author :
Chen, Tzer-Shyong ; Jeng, Fuh-Gwo ; Liu, Yu-Chia
Author_Institution :
Dept. of Inf. Manage., Tunghai Univ., Taichung
Abstract :
Mounting popularity of the Internet has led to the birth of instant messaging, an up-and-coming form of Internet communication. Instant messaging is very popular with businesses and individuals since it has instant communication ability. As a result, Internet security has become a pressing and important topic for discussion. Therefore, in recent years, a lot of attention has been drawn towards Internet security and the various attacks carried out by hackers over the Internet. People today often handle affairs via the Internet. For instance, instead of the conventional letter, they communicate with others by e-mails; they chat with friends through an instant messenger; find information by browsing Websites instead of going to the library; perform e-commerce transactions through the Internet, etc. Although the convenience of the Internet makes our life easier, it is also a threat to Internet security. For instance, a business email intercepted during its transmission may let slip business confidentiality; file transfers via instant messengers may also be intercepted, and then implanted with backdoor malwares; conversations via instant messengers could be eavesdropped. Furthermore, ID and password theft may lose us money when using Internet bank service. Attackers on the Internet use hacking tricks to damage systems while users are connected to the Internet. These threats along with possible careless disclosure of business information make instant messaging a very unsafe method of communication for businesses. The paper divides hacking tricks into three categories: (1) Trojan programs that share files via instant messenger; (2) phishing or fraud via e-mails; and (3) fake Websites
Keywords :
Internet; authorisation; computer crime; electronic messaging; invasive software; unsolicited e-mail; Internet security; Trojan programs; backdoor malwares; email; firewall; hacking; instant messaging; intrusion detection; phishing; Business communication; Communication system control; Computer crime; Computer hacking; Electronic mail; Information management; Information security; Internet; National security; Peer to peer computing; Firewall; Hacking tricks; Intrusion detection system.; Phishing; Trojan programs;
Conference_Titel :
Parallel and Distributed Computing, Applications and Technologies, 2006. PDCAT '06. Seventh International Conference on
Conference_Location :
Taipei
Print_ISBN :
0-7695-2736-1
DOI :
10.1109/PDCAT.2006.66