ABSTRACT

Recent headlines demonstrate that the latest crop of hacker

tools and techniques can be highly damaging to an organi-

zation’s sensitive information and reputation. With the rise

of powerful, easy-to-use, and widely distributed hacker

tools, many in the security industry have observed that

today is the golden age of hacking. The purpose of this

entry is to describe the tools in widespread use today

for compromising computer and network security.

Additionally, for each tool and technique described, the

entry presents practical advice on defending against each

type of attack.