First page Back Continue Last page Summary Graphic
Info-Looting
(copyright 1999, CorpNet Security, Inc.)
Hackers and internal intruders will use this confusion as an opportunity to steal data, destroy access and place back doors into systems that they have found (through current research) to be vulnerable to attack.