First page Back Continue Last page Graphics
Intrusion Techniques
Objective: Gain access to a system
Frequent Goal: Acquiring a user password
Most systems have a file that maps a password to each user
Password file protection:
- one-way encryption
- access control