Hacking: anatomy of an attack

Several comments sprung to mind when I read the article:
1) the liability of the hacker, what if he was employed by security firm?
2) why goverment as a target? government is not the only institution to have information. Tesco has probably more about us that government.
3) the IT team seems doing its work; how efficient is technology to counterattack technology?
4) the key role IT team plays in safeguarding evidence which for criminal investigation purposes can only be crucial…
Sally Whittle, “Anatomy of an attack”, ZDNet (7 January 2008)


About Audrey Guinchard

Senior Lecturer @ University of Essex (UK)
This entry was posted in Offences - Hacking (unauthorised access). Bookmark the permalink.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s