Quick Reference

The sequence of activities that a particular cracker carries out when attempting to make an illegal intrusion into a network. While such a sequence does not have the uniqueness of fingerprints it is clear that certain crackers can be identified by their sequence of attempts to enter a network.

Subjects: Computing.

Reference entries