Việc quản lý của các phím là bane của tất cả các hệ thống mã hóa. Các phím được các thông tin có giá trị nhất. Nếu tôi có thể nhận được một chìa khóa, tôi có thể nhận được (giải mã) tất cả mọi thứ được mã hóa bằng khóa đó. Trong một số trường hợp, tôi cũng có thể có thể có được thành công phím. Việc quản lý của các phím không chỉ là bảo vệ họ khi sử dụng. Nó cũng là về việc tạo phím mạnh, an toàn phân phối phím để người dùng từ. | CHAPTER 13 Hacker Techniques Copyright 2001 The McGraw-Hill Companies Inc. Click Here for Terms of Use. 235 236 Network Security A Beginner s Guide No discussion of security would be complete without a chapter on hackers and how they work. I use the term hacker here for its current meaning an individual who breaks into computers. It should be noted that in the past hacker was not a derogatory term but rather a term for an individual who could make computers work. Perhaps a more appropriate term might be cracker or criminal however to conform to current usage hacker will be used to identify those individuals who seek to intrude into computer systems or to make such systems unusable. Studies have found hackers most often to be Male Between 16 and 35 years old Loners Intelligent Technically proficient This is not to say that all hackers are male or between the ages of 16 and 35 but most are. Hackers have an understanding of computers and networks and how they actually work. Some have a great understanding of how protocols are supposed to work and how protocols can be used to make systems act in certain ways. This chapter is intended to introduce you to hackers their motivation and their techniques. I won t teach you how to hack but I ll hopefully give you some insights as to how your systems may be attacked and used. A HACKER S MOTIVATION Motivation is the key component to understanding hackers. The motivation of the hacker identifies the purpose of the attempted intrusion. Understanding the motivation also helps us to understand what makes a computer interesting to such an individual. Is the system somehow valuable or enticing To which type of intruder is the system of interest Answering these questions allows security professionals to better assess the danger to their systems. Challenge The original motivation for breaking into computer systems was the challenge of doing so. This is still the most common motivation for hacking. Once into a system hackers brag about