
Summary
As we have seen, the potential intruder has a vested interest in acquiring access to
your data in ways that will not readily make his presence known.Through the use of
stealth scans, piecemeal system and network reconnaissance, and social engineering, a
skilled intruder will seek to stack the cards in his favor so he can penetrate your sys-
tems to wreak immediate havoc, or simply set himself up to monitor (and possibly
modify) your every move. Contrary to popular perception, the skilled intruder is
patient, practiced, and will not engage in activities that will give his designs away.
Using conventional and unconventional reconnaissance—social ...