ABSTRACT

In this chapter we’ll introduce some of the techniques and issues involved with handling an intrusion in process. The issues, both technical and legal, are complex. Additionally, there are ethical issues involved with hacking intrusions. We’ll explore some of the attitudes surrounding various types of hacker intrusions, and how they affect your situation when an attack is in progress. Finally, we’ll look at various types of back doors that intruders may leave in your system. These may enable them to return at a later time to continue their efforts.