Welcome to中国防火墙网
Add to Favorites | Chinese
The person is the soliddest firewall
From;    Author:Stand originally

To defy social project is atttacked, must establish the firewall ” that “ comprises by the person, network framework abandons in the meantime the illusion of Achillean and so on.

Undertake grooming to employee, make partial enterprise can prevent and identify the purpose that social project atttacks. The difficulty that this grooms than having firewall system to employee wants small much. Accordingly, should organize measure only proper, “ person ” will make the most fragile one ring in information theft-resistant link chain no longer, become the safest backup force however.

A lot of network safety case that produce in reality, the technique that Hun uses is not very brillant, it is to pass a few very simple technologies to undertake defeating solving to the system merely. For instance the force of countersign guesses, these attack do not need too advanced technology, use merely a few off-the-peg software can come true with a bit patience. Still have the security of the network that defeat solution with lower content of a kind of technology even the method of defense system, the member that it operates network insider through a variety of method diddle provides necessary information (like administrator countersign) , the visit that gets a network thereby counterpoises. This kind of method calls ” of “ society engineering (Social Engineering) .

One, the hacker trap of social project

Social engineering is a trap actually, hacker normally in order to chat, deceit, sham or the means such as spoken language, cover the secret that takes user system from inside lawful user, for example: Code of user list, user reachs network structure. Still for instance, the curiosity that only should a person cannot defy itself viewed postal matter, virus can go greatly indulge in wilful persecution.

Everybody's hep Mydoom and Bagle are the virus that uses have one's way of social engineering trap. If you are engaged in network safety working to had had period of time, can speak this most the hacker name of “ notorious ” : Kevin Mitnick- - he ever was regarded as news caption by media, be regarded as to comment an object by the TV program. Somebody ever described him with such statement: &Ground of Ldquo; his act as if there is no one else present stands in the one horn of corridor of the White House, the look is abstruse. Computer of a notebook and he is followed closely, he often knocks the instruction ……” of next certain mystery on clavier. We are adducible his famousest hacker is academic: “ wins the credit of others, use this kind of credit next make merry or take advantage, in real world this kind of phenomenon cans be found everywhere, exist as much in network world. The person is animal of a kind of society, the hope is liked, by accredit, once this is planted,the nature is used by us ……”

2, the trustful crisis of E times
Previous12 Next