Cyberphysical Systems for Epilepsy and Related Brain Disorders by Nikolaos S. Voros & Christos P. Antonopoulos

Cyberphysical Systems for Epilepsy and Related Brain Disorders by Nikolaos S. Voros & Christos P. Antonopoulos

Author:Nikolaos S. Voros & Christos P. Antonopoulos
Language: eng
Format: epub
Publisher: Springer International Publishing, Cham


Hacker/Cracker Incidents

Responding to hacker/cracker incidents is somewhat different than responding to a worm or virus incident. Some hackers are very sophisticated and will go to great depths to avoid detection. Others are naive young students looking for a thrill. Hacker incidents can be divided into three types: attempts to gain access to a system, an active session on a system, or events which have been discovered after the fact. Of the three, an active hacker/cracker session is the most severe and must be dealt with as soon as possible. There are two methods for dealing with an active hacker/cracker incident. The first method is to immediately lock the person out of the system and restore the system to a safe state. The second method is to allow the hacker/cracker to continue his probe/attack and attempt to gather information that will lead to an identification and possible criminal conviction. The method used to handle a cracker/hacker incident will be determined by the level of understanding of the risks involved.



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.