Chapter 15. Intrusion Process

The scope of this chapter is to understand the technical capabilities and limitations of a potential unauthorized intruder in order to make sure that your own security measures can withstand a hacker’s attempt to breach them. It is important to know not only your own tools and techniques, but also those of the potential adversary, in order to better protect against them. This is the first part of an age-old strategy used by the famous Chinese strategist, Sun Tzu, who said, “If you know the enemy and know yourself, you need not fear the result of a hundred battles. If you know yourself but not the enemy, for every victory gained you will also suffer a defeat. If you know neither the enemy nor yourself, you will succumb ...

Get Wireless Security: Know It All now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.