HP OpenVMS Guide to System Security > Chapter 10 System Security Breaches

Forms of System Attacks

 » Table of Contents

 » Glossary

 » Index

As security administrator, you must monitor the system on a regular basis for possible security breaches. Following are the most common forms of system attacks:

  • Hunting for access lines

  • Hunting for passwords

  • Attempting a break-in

  • Changing or creating user authorization file (UAF) records

  • Granting/stealing extra privileges

  • Introducing apparently innocent software (Trojan horse software) that is intended to steal user passwords or do other damage to the system

  • Introducing viruses in command procedures and programs to gain access to privileged accounts

  • Scavenging disks

  • Using a node as a gateway to other nodes